Likely firewall problem

I enabled inbound and outbound on port:80 for any. Not sure what else might be blocking it. This is currently running on a personal PC as I work through the issues of setting this all up. could it just be a timeout?

My domain is:
edstestsite.site

I ran this command:
certbot certonly --standalone -vv

It produced this output:
Since I was running -vv this a very verbose.

Root logging level set at 10
Saving debug log to C:\Certbot\log\letsencrypt.log
Requested authenticator standalone and installer None
Single candidate plugin: * standalone
Description: Runs an HTTP server locally which serves the necessary validation files under the /.well-known/acme-challenge/ request path. Suitable if there is no HTTP server already running. HTTP challenge only (wildcards not supported).Interfaces: Authenticator, Plugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00000210B4CFCE80>
Prep: True
Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00000210B4CFCE80> and installer None
Plugins selected: Authenticator standalone, Installer None
Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/1122362617', new_authzr_uri=None, terms_of_service=None), fe2bbb187b2ec3e937ad5272a4a3434e, Meta(creation_dt=datetime.datetime(2023, 5, 22, 15, 57, 38, tzinfo=<UTC>), creation_host='EdLindaHomeI7', register_to_eff=None))>
Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:58:44 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "EPBi4d7Dzi8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
No installer, picking names manually
Please enter the domain name(s) you would like on your certificate (comma and/or
space separated) (Enter 'c' to cancel): edstestsite.site
Notifying user: Requesting a certificate for edstestsite.site
Requesting a certificate for edstestsite.site
Requesting fresh nonce
Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:58:55 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: C400Gh7EC_G2X4k7oEN8OphPRf4HLIB1AllaJgFQfZAMy5Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


Storing nonce: C400Gh7EC_G2X4k7oEN8OphPRf4HLIB1AllaJgFQfZAMy5Y
JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "edstestsite.site"\n    }\n  ]\n}'
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICJDNDAwR2g3RUNfRzJYNGs3b0VOOE9waFBSZjRITElCMUFsbGFKZ0ZRZlpBTXk1WSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0",
  "signature": "ni23YrIS-sXzYBJRP0dE09OUnL7TktqhOMQTyKD8GHW3GqqD4hERWR7d8HSXqGCaawa1wztf5t2QW5UX1p3UWTBzBmyoLCzzfoWmgX4sw5zvnqBLDsAms15-yINrgdLo0hje4T-lUgnODzykWim4TuXFPbEDTpMoczPhwj1vUAPfk0nSQvrwsGRy8kSTqhAiBI25slWlrckQCK3kKRzdi4Ow5RVjTLGpEtADsMU_mvEd3bhtTDxw3rH4fVbDNhw01za6Luq-Knmnhu4fi_aOb1Lnr9fEOT1drTxXSkfMGIGQoOuP63d5Q4gjdRdZWuiVbE7ItmtNfZ4d08SS-Flrww",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImVkc3Rlc3RzaXRlLnNpdGUiCiAgICB9CiAgXQp9"
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 342
Received response:
HTTP 201
Server: nginx
Date: Mon, 22 May 2023 19:58:55 GMT
Content-Type: application/json
Content-Length: 342
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/1122362617/183870125297
Replay-Nonce: C400uwM6zKIkMwyJB23cgow3Cs-MTE03Xftp5MBwSvcT5_k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-05-29T19:58:55Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "edstestsite.site"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1122362617/183870125297"
}
Storing nonce: C400uwM6zKIkMwyJB23cgow3Cs-MTE03Xftp5MBwSvcT5_k
JWS payload:
b''
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICJDNDAwdXdNNnpLSWtNd3lKQjIzY2dvdzNDcy1NVEUwM1hmdHA1TUJ3U3ZjVDVfayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjMwMTc4Nzk3OTI3In0",
  "signature": "VD0ODYxoYI09cE6oi_7H3ADk1Ix1xcuJLzD86hCJuowLvs56dZKdTIwtII6yoNG61yLYDrylPJy8Wy-d1kL_WteBpE1bjonTCLCblJ7Lx4o7W-0FkZ_cYR9PwxEXjJLCtmOE1V9B60k8fx5bKk3nkyuFKmqO3gu8wTclZgnIYL-BXGGE64SebWsI-OfLX-WUzcUooK1r4WZOMZrm4jgHRhzgXji3Zmq98uVqf1KS38cNoEIZgNjbhRzTTyicNz84G9shZi2IIFO2LR8SDjVxjb-MirLqq6Yw2EF__QL6YhUmA6DMI2mTkTrFiOL0AVrQcjl-KJzp3ZUwfV4sAHgmIA",
  "payload": ""
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/230178797927 HTTP/1.1" 200 800
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:58:55 GMT
Content-Type: application/json
Content-Length: 800
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4397GjAkvNei8uh8kAmF4LqSuz-iKimI0J-EcfYwUBaRDts
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "edstestsite.site"
  },
  "status": "pending",
  "expires": "2023-05-29T19:58:55Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/2fPTlg",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/LyzDYQ",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
    }
  ]
}
Storing nonce: 4397GjAkvNei8uh8kAmF4LqSuz-iKimI0J-EcfYwUBaRDts
Performing the following challenges:
http-01 challenge for edstestsite.site
Successfully bound to :80 using IPv6
Successfully bound to :80 using IPv4
JWS payload:
b'{}'
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICI0Mzk3R2pBa3ZOZWk4dWg4a0FtRjRMcVN1ei1pS2ltSTBKLUVjZll3VUJhUkR0cyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjMwMTc4Nzk3OTI3LzRSM0NLUSJ9",
  "signature": "IJDs7eFd3NQoHDktBRdZrjZo865diDXnx77PdtO_9prSm2yA9ADR-yibycdXZxCvK2Vpkr6OF5r6o-MAEM5tpjKAKzYRRtny3kny1RonvSBYPaqM5zzDxkn_5v2pOJQ4T-HMF0Hlhd0ZOQhr8HnvpkiRmqZZKLo8Cl_d7RDas_GsYpXtfDYau2Oy8HRvwTkiOS2V-1olkfsgLMJSpPlyhikLhVl0iDl5UTCXSQ1-Jxu41ZyJeqZVEUB4QKaemqoiJYSFI-D7bjwYo1jZ_qAarLkSYkmPJK8JHgjRid0-427itTOd1xE1iKC6zleNk1ny_xLjJUofm3h7iza2QtOpKw",
  "payload": "e30"
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/230178797927/4R3CKQ HTTP/1.1" 200 187
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:58:55 GMT
Content-Type: application/json
Content-Length: 187
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ
Replay-Nonce: C400tsQO1YN_E0wDnb8blgPeXaAXu61hYjCTszLp5WpEQq8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "type": "http-01",
  "status": "pending",
  "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ",
  "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
}
Storing nonce: C400tsQO1YN_E0wDnb8blgPeXaAXu61hYjCTszLp5WpEQq8
Waiting for verification...
JWS payload:
b''
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICJDNDAwdHNRTzFZTl9FMHdEbmI4YmxnUGVYYUFYdTYxaFlqQ1RzekxwNVdwRVFxOCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjMwMTc4Nzk3OTI3In0",
  "signature": "lDajUh1kJuR9Od3jO1cU7aQGB5Q3WtXYW9q27aqrhS2G6DGXx6eJDE3ytgUmkTTwEI04Kyl9xrAadF-U_xv9XU4QOC5kd45dQnUsylZL-HnmNsX-uX6ftL3BPXC0XvAFKwBs6oYJhiTNSsjJeE3SAXxAwuYBAuZrd-cRK2saGa9DO9niCvcIY-FNCVU-Ke8I299R9RpxGLst2abfTzV6Mi9qpwvRJEOExaHnMlJyV_Yz9LhscAxf5Ymfaej-pROOmeGRwwTg3x3Aexfc-Yzq9Jr-fV3aNC02h0BUeHb-btbl7UDGdx2ri8iRBPxZWXoBUl0MmMIYQD8x3bshY-w8Gg",
  "payload": ""
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/230178797927 HTTP/1.1" 200 800
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:58:57 GMT
Content-Type: application/json
Content-Length: 800
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4397b4PhDjvG1R2BJ_ruNJW7fID-D1GricQYSpi7mJsOvck
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "edstestsite.site"
  },
  "status": "pending",
  "expires": "2023-05-29T19:58:55Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/2fPTlg",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/LyzDYQ",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
    }
  ]
}
Storing nonce: 4397b4PhDjvG1R2BJ_ruNJW7fID-D1GricQYSpi7mJsOvck
JWS payload:
b''
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICI0Mzk3YjRQaERqdkcxUjJCSl9ydU5KVzdmSUQtRDFHcmljUVlTcGk3bUpzT3ZjayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjMwMTc4Nzk3OTI3In0",
  "signature": "iPljYb_1J1dPEnXneg-6F7TxWgE0EupBAhecoFRZ-BDY53HViuktj3Jeo2wPNmeVI38ZZ_J7XkM4IWQ1UD4JB9CTxr57qcQoiW-Cu5IIOHtmT1ECv5P9VumLA6fDI1Qt6iBR0EqEeeAgrBcOUTCFSzYuEAlBtA800Zu7-jHz9tzuISAYHT2F1XGEALZgKr4MllFXAZB48zLK_q14hqSOV-sCqoxCVpJcDyb_1hg1qDTRa3SCh1X9bT4AoP7utuXTZMDY2F8_9HNCnXKrvThvmqWeqkPdd06atUZ3nkHw2hMrRTL9PKjmpyxsiuMRuS8Q35NTNQFPPkUuZnPqYZIX6Q",
  "payload": ""
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/230178797927 HTTP/1.1" 200 800
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:59:00 GMT
Content-Type: application/json
Content-Length: 800
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: C400uAUKiANGIFPNK1Y45jr_Z9V7dn8-XBSVwNsBQ25tR7o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "edstestsite.site"
  },
  "status": "pending",
  "expires": "2023-05-29T19:58:55Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/2fPTlg",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/LyzDYQ",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
    }
  ]
}
Storing nonce: C400uAUKiANGIFPNK1Y45jr_Z9V7dn8-XBSVwNsBQ25tR7o
JWS payload:
b''
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICJDNDAwdUFVS2lBTkdJRlBOSzFZNDVqcl9aOVY3ZG44LVhCU1Z3TnNCUTI1dFI3byIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjMwMTc4Nzk3OTI3In0",
  "signature": "AWX7wruRm3os3pAXvro9MeV7UlL8U3MIRhqp43Txt6k7y4fbT1nhsxehDts3ln8UdXKGgcW5XJEYobOxDA1c2NZL-QxqWruqWpJ38Yb1Gg4KPe0WwLxNIULq8d8VMrylhwf2d6Y_HrFYD_SXPH7E4dpwQ0M3senAGJGlldsccG-vYEpM5fL_6NPVuvc2QI7xsdDm4WH4jvQmdKcuUsoPzb63nYbzrEZwJnwgfhriRX70igpjm0uc-KYJFW1-C0Ge1s1UTwZX0JDxVI09jvfASDFFzqSDyFD0A_bsuN7AWTASAh9qMeSDmx3qL6wJeoCh6H5roXVg3qHqtDCABkBB3g",
  "payload": ""
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/230178797927 HTTP/1.1" 200 800
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:59:03 GMT
Content-Type: application/json
Content-Length: 800
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: C400Npv_oRhfbFO37W_O1LzSGwULSrBgdjQ-OYg6APA_OFI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "edstestsite.site"
  },
  "status": "pending",
  "expires": "2023-05-29T19:58:55Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/2fPTlg",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/LyzDYQ",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
    }
  ]
}
Storing nonce: C400Npv_oRhfbFO37W_O1LzSGwULSrBgdjQ-OYg6APA_OFI
JWS payload:
b''
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICJDNDAwTnB2X29SaGZiRk8zN1dfTzFMelNHd1VMU3JCZ2RqUS1PWWc2QVBBX09GSSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjMwMTc4Nzk3OTI3In0",
  "signature": "BLr4HsBvGemlF1phlr008y_2-TOdtVCkd6Ofi37VrRBchRI8S8VAhGX2ST_pMrP4r5Rz6nar4BcUYEyA5bKMNbD2d_AM4Fxlu50Ag1jmo3Wvr40qJfFYvFl572f1oc24f5y9j16LtuUefiIFJuNBAbnc-ZH6Q8Lni3ATn_XEPquMSk-CZXeaFW4fFCxxkB3-m1bz6eYrRIsKp9QDImOFDDzCanKS2tE63QljoaHWeAfumDnI7tryL1LQ-pvivVWAlMT_oECLkW-Rn-DN7EOBSB2bX7u531APapzr2SGzH6BBLB4V536qNaiPKWzhozCYNKYi1e66QPUe9mV8YCssmA",
  "payload": ""
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/230178797927 HTTP/1.1" 200 1065
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:59:06 GMT
Content-Type: application/json
Content-Length: 1065
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: C400XCeVFbV08W7WcblhEc2XkHg7XCQ2fol3q4uDwr1-RcE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "edstestsite.site"
  },
  "status": "invalid",
  "expires": "2023-05-29T19:58:55Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "invalid",
      "error": {
        "type": "urn:ietf:params:acme:error:connection",
        "detail": "72.211.171.252: Fetching http://edstestsite.site/.well-known/acme-challenge/RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc: Timeout during connect (likely firewall problem)",
        "status": 400
      },
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ",
      "token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc",
      "validationRecord": [
        {
          "url": "http://edstestsite.site/.well-known/acme-challenge/RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc",
          "hostname": "edstestsite.site",
          "port": "80",
          "addressesResolved": [
            "72.211.171.252"
          ],
          "addressUsed": "72.211.171.252"
        }
      ],
      "validated": "2023-05-22T19:58:55Z"
    }
  ]
}
Storing nonce: C400XCeVFbV08W7WcblhEc2XkHg7XCQ2fol3q4uDwr1-RcE
Challenge failed for domain edstestsite.site
http-01 challenge for edstestsite.site
Notifying user:
Certbot failed to authenticate some domains (authenticator: standalone). The Certificate Authority reported these problems:
  Domain: edstestsite.site
  Type:   connection
  Detail: 72.211.171.252: Fetching http://edstestsite.site/.well-known/acme-challenge/RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc: Timeout during connect (likely firewall problem)

Hint: The Certificate Authority failed to download the challenge files from the temporary standalone webserver started by Certbot on port 80. Ensure that the listed domains point to this machine and that it can accept inbound connections from the internet.


Certbot failed to authenticate some domains (authenticator: standalone). The Certificate Authority reported these problems:
  Domain: edstestsite.site
  Type:   connection
  Detail: 72.211.171.252: Fetching http://edstestsite.site/.well-known/acme-challenge/RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc: Timeout during connect (likely firewall problem)

Hint: The Certificate Authority failed to download the challenge files from the temporary standalone webserver started by Certbot on port 80. Ensure that the listed domains point to this machine and that it can accept inbound connections from the internet.

Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\auth_handler.py", line 108, in handle_authorizations
    self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\auth_handler.py", line 212, in _poll_authorizations
    raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

Calling registered functions
Cleaning up challenges
Stopping server at :::80...
Stopping server at 0.0.0.0:80...
Exiting abnormally:
Traceback (most recent call last):
  File "runpy.py", line 197, in _run_module_as_main
  File "runpy.py", line 87, in _run_code
  File "C:\Program Files\Certbot\bin\certbot.exe\__main__.py", line 29, in <module>
    sys.exit(main())
  File "C:\Program Files\Certbot\pkgs\certbot\main.py", line 19, in main
    return internal_main.main(cli_args)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 1864, in main
    return config.func(config, plugins)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 1597, in certonly
    lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 141, in _get_and_save_cert
    lineage = le_client.obtain_and_enroll_certificate(domains, certname)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\client.py", line 517, in obtain_and_enroll_certificate
    cert, chain, key, _ = self.obtain_certificate(domains)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\client.py", line 428, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\client.py", line 496, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\auth_handler.py", line 108, in handle_authorizations
    self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\auth_handler.py", line 212, in _poll_authorizations
    raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
Some challenges have failed.
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile C:\Certbot\log\letsencrypt.log or re-run Certbot with -v for more details.

My web server is (include version):
Apache 2.4.56

The operating system my web server runs on is (include version):
Windows 10

My hosting provider, if applicable, is:
Personal machine

I can login to a root shell on my machine (yes or no, or I don't know):
Yes

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
NO

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):

2.6.0

If it's on a residential home connection, possibly your ISP. That looks to be a Cox address, and they document that they block port 80. You'll need to find a way to get it unblocked (possibly by upgrading to a business-type plan), host somewhere else that allows port 80, or use a different challenge type.

5 Likes

Yep, you nailed it! I have two machines that I can use but obviously have different IP address. The other is tied to Cox Business and has the static IP address and I assume port 80 is usable. Can I obtain the certs on that machine and then move them to another machine/ip address? In then end this will all end up on the Business machine but was trying to work through a lot of stuff that is new to me on a test machine. I haven't seen the part about how often I need to renew them yet.

2 Likes

I think you will probably be happier by using the DNS challenge type, if you want the test machine to be able to get certificates. Otherwise, set it all up on the business machine.

Moving the certificates is technically possible but it's inconvenient and would be a lot of work to automate - and you have to repeat the process at least every 90 days for renewal.

Your domain currently has its DNS hosted with Namecheap, presumably you bought your domain from them.

If you're willing to point your domain's DNS hosting somewhere else that is widely supported by ACME/Let's Encrypt clients, this would become a bit easier. Cloudflare is one free provider that fits the bill.

You could try an ACME client for Windows like https://certifytheweb.com, then set it up against your Cloudflare account and you will have automatically renewing certificates, without port 80.

6 Likes

Yes, but that may be very difficult to automate the renewals.
How long will you be "testing"?
If less than 90 days, then you need not worry about renewing.

4 Likes

I'm struggling to find the steps to go the DNS_01 challenge. Any pointers? Again thanks,

1 Like

Disregard, I got it working. So happy and thanks for all of the replies.

2 Likes

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.