I enabled inbound and outbound on port:80 for any. Not sure what else might be blocking it. This is currently running on a personal PC as I work through the issues of setting this all up. could it just be a timeout?
My domain is:
edstestsite.site
I ran this command:
certbot certonly --standalone -vv
It produced this output:
Since I was running -vv this a very verbose.
Root logging level set at 10
Saving debug log to C:\Certbot\log\letsencrypt.log
Requested authenticator standalone and installer None
Single candidate plugin: * standalone
Description: Runs an HTTP server locally which serves the necessary validation files under the /.well-known/acme-challenge/ request path. Suitable if there is no HTTP server already running. HTTP challenge only (wildcards not supported).Interfaces: Authenticator, Plugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00000210B4CFCE80>
Prep: True
Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00000210B4CFCE80> and installer None
Plugins selected: Authenticator standalone, Installer None
Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/1122362617', new_authzr_uri=None, terms_of_service=None), fe2bbb187b2ec3e937ad5272a4a3434e, Meta(creation_dt=datetime.datetime(2023, 5, 22, 15, 57, 38, tzinfo=<UTC>), creation_host='EdLindaHomeI7', register_to_eff=None))>
Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:58:44 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"EPBi4d7Dzi8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
No installer, picking names manually
Please enter the domain name(s) you would like on your certificate (comma and/or
space separated) (Enter 'c' to cancel): edstestsite.site
Notifying user: Requesting a certificate for edstestsite.site
Requesting a certificate for edstestsite.site
Requesting fresh nonce
Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:58:55 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: C400Gh7EC_G2X4k7oEN8OphPRf4HLIB1AllaJgFQfZAMy5Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Storing nonce: C400Gh7EC_G2X4k7oEN8OphPRf4HLIB1AllaJgFQfZAMy5Y
JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "edstestsite.site"\n }\n ]\n}'
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICJDNDAwR2g3RUNfRzJYNGs3b0VOOE9waFBSZjRITElCMUFsbGFKZ0ZRZlpBTXk1WSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0",
"signature": "ni23YrIS-sXzYBJRP0dE09OUnL7TktqhOMQTyKD8GHW3GqqD4hERWR7d8HSXqGCaawa1wztf5t2QW5UX1p3UWTBzBmyoLCzzfoWmgX4sw5zvnqBLDsAms15-yINrgdLo0hje4T-lUgnODzykWim4TuXFPbEDTpMoczPhwj1vUAPfk0nSQvrwsGRy8kSTqhAiBI25slWlrckQCK3kKRzdi4Ow5RVjTLGpEtADsMU_mvEd3bhtTDxw3rH4fVbDNhw01za6Luq-Knmnhu4fi_aOb1Lnr9fEOT1drTxXSkfMGIGQoOuP63d5Q4gjdRdZWuiVbE7ItmtNfZ4d08SS-Flrww",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImVkc3Rlc3RzaXRlLnNpdGUiCiAgICB9CiAgXQp9"
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 342
Received response:
HTTP 201
Server: nginx
Date: Mon, 22 May 2023 19:58:55 GMT
Content-Type: application/json
Content-Length: 342
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/1122362617/183870125297
Replay-Nonce: C400uwM6zKIkMwyJB23cgow3Cs-MTE03Xftp5MBwSvcT5_k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "pending",
"expires": "2023-05-29T19:58:55Z",
"identifiers": [
{
"type": "dns",
"value": "edstestsite.site"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1122362617/183870125297"
}
Storing nonce: C400uwM6zKIkMwyJB23cgow3Cs-MTE03Xftp5MBwSvcT5_k
JWS payload:
b''
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICJDNDAwdXdNNnpLSWtNd3lKQjIzY2dvdzNDcy1NVEUwM1hmdHA1TUJ3U3ZjVDVfayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjMwMTc4Nzk3OTI3In0",
"signature": "VD0ODYxoYI09cE6oi_7H3ADk1Ix1xcuJLzD86hCJuowLvs56dZKdTIwtII6yoNG61yLYDrylPJy8Wy-d1kL_WteBpE1bjonTCLCblJ7Lx4o7W-0FkZ_cYR9PwxEXjJLCtmOE1V9B60k8fx5bKk3nkyuFKmqO3gu8wTclZgnIYL-BXGGE64SebWsI-OfLX-WUzcUooK1r4WZOMZrm4jgHRhzgXji3Zmq98uVqf1KS38cNoEIZgNjbhRzTTyicNz84G9shZi2IIFO2LR8SDjVxjb-MirLqq6Yw2EF__QL6YhUmA6DMI2mTkTrFiOL0AVrQcjl-KJzp3ZUwfV4sAHgmIA",
"payload": ""
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/230178797927 HTTP/1.1" 200 800
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:58:55 GMT
Content-Type: application/json
Content-Length: 800
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4397GjAkvNei8uh8kAmF4LqSuz-iKimI0J-EcfYwUBaRDts
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "edstestsite.site"
},
"status": "pending",
"expires": "2023-05-29T19:58:55Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/2fPTlg",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/LyzDYQ",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
}
]
}
Storing nonce: 4397GjAkvNei8uh8kAmF4LqSuz-iKimI0J-EcfYwUBaRDts
Performing the following challenges:
http-01 challenge for edstestsite.site
Successfully bound to :80 using IPv6
Successfully bound to :80 using IPv4
JWS payload:
b'{}'
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICI0Mzk3R2pBa3ZOZWk4dWg4a0FtRjRMcVN1ei1pS2ltSTBKLUVjZll3VUJhUkR0cyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjMwMTc4Nzk3OTI3LzRSM0NLUSJ9",
"signature": "IJDs7eFd3NQoHDktBRdZrjZo865diDXnx77PdtO_9prSm2yA9ADR-yibycdXZxCvK2Vpkr6OF5r6o-MAEM5tpjKAKzYRRtny3kny1RonvSBYPaqM5zzDxkn_5v2pOJQ4T-HMF0Hlhd0ZOQhr8HnvpkiRmqZZKLo8Cl_d7RDas_GsYpXtfDYau2Oy8HRvwTkiOS2V-1olkfsgLMJSpPlyhikLhVl0iDl5UTCXSQ1-Jxu41ZyJeqZVEUB4QKaemqoiJYSFI-D7bjwYo1jZ_qAarLkSYkmPJK8JHgjRid0-427itTOd1xE1iKC6zleNk1ny_xLjJUofm3h7iza2QtOpKw",
"payload": "e30"
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/230178797927/4R3CKQ HTTP/1.1" 200 187
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:58:55 GMT
Content-Type: application/json
Content-Length: 187
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ
Replay-Nonce: C400tsQO1YN_E0wDnb8blgPeXaAXu61hYjCTszLp5WpEQq8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
}
Storing nonce: C400tsQO1YN_E0wDnb8blgPeXaAXu61hYjCTszLp5WpEQq8
Waiting for verification...
JWS payload:
b''
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICJDNDAwdHNRTzFZTl9FMHdEbmI4YmxnUGVYYUFYdTYxaFlqQ1RzekxwNVdwRVFxOCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjMwMTc4Nzk3OTI3In0",
"signature": "lDajUh1kJuR9Od3jO1cU7aQGB5Q3WtXYW9q27aqrhS2G6DGXx6eJDE3ytgUmkTTwEI04Kyl9xrAadF-U_xv9XU4QOC5kd45dQnUsylZL-HnmNsX-uX6ftL3BPXC0XvAFKwBs6oYJhiTNSsjJeE3SAXxAwuYBAuZrd-cRK2saGa9DO9niCvcIY-FNCVU-Ke8I299R9RpxGLst2abfTzV6Mi9qpwvRJEOExaHnMlJyV_Yz9LhscAxf5Ymfaej-pROOmeGRwwTg3x3Aexfc-Yzq9Jr-fV3aNC02h0BUeHb-btbl7UDGdx2ri8iRBPxZWXoBUl0MmMIYQD8x3bshY-w8Gg",
"payload": ""
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/230178797927 HTTP/1.1" 200 800
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:58:57 GMT
Content-Type: application/json
Content-Length: 800
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4397b4PhDjvG1R2BJ_ruNJW7fID-D1GricQYSpi7mJsOvck
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "edstestsite.site"
},
"status": "pending",
"expires": "2023-05-29T19:58:55Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/2fPTlg",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/LyzDYQ",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
}
]
}
Storing nonce: 4397b4PhDjvG1R2BJ_ruNJW7fID-D1GricQYSpi7mJsOvck
JWS payload:
b''
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICI0Mzk3YjRQaERqdkcxUjJCSl9ydU5KVzdmSUQtRDFHcmljUVlTcGk3bUpzT3ZjayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjMwMTc4Nzk3OTI3In0",
"signature": "iPljYb_1J1dPEnXneg-6F7TxWgE0EupBAhecoFRZ-BDY53HViuktj3Jeo2wPNmeVI38ZZ_J7XkM4IWQ1UD4JB9CTxr57qcQoiW-Cu5IIOHtmT1ECv5P9VumLA6fDI1Qt6iBR0EqEeeAgrBcOUTCFSzYuEAlBtA800Zu7-jHz9tzuISAYHT2F1XGEALZgKr4MllFXAZB48zLK_q14hqSOV-sCqoxCVpJcDyb_1hg1qDTRa3SCh1X9bT4AoP7utuXTZMDY2F8_9HNCnXKrvThvmqWeqkPdd06atUZ3nkHw2hMrRTL9PKjmpyxsiuMRuS8Q35NTNQFPPkUuZnPqYZIX6Q",
"payload": ""
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/230178797927 HTTP/1.1" 200 800
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:59:00 GMT
Content-Type: application/json
Content-Length: 800
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: C400uAUKiANGIFPNK1Y45jr_Z9V7dn8-XBSVwNsBQ25tR7o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "edstestsite.site"
},
"status": "pending",
"expires": "2023-05-29T19:58:55Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/2fPTlg",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/LyzDYQ",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
}
]
}
Storing nonce: C400uAUKiANGIFPNK1Y45jr_Z9V7dn8-XBSVwNsBQ25tR7o
JWS payload:
b''
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICJDNDAwdUFVS2lBTkdJRlBOSzFZNDVqcl9aOVY3ZG44LVhCU1Z3TnNCUTI1dFI3byIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjMwMTc4Nzk3OTI3In0",
"signature": "AWX7wruRm3os3pAXvro9MeV7UlL8U3MIRhqp43Txt6k7y4fbT1nhsxehDts3ln8UdXKGgcW5XJEYobOxDA1c2NZL-QxqWruqWpJ38Yb1Gg4KPe0WwLxNIULq8d8VMrylhwf2d6Y_HrFYD_SXPH7E4dpwQ0M3senAGJGlldsccG-vYEpM5fL_6NPVuvc2QI7xsdDm4WH4jvQmdKcuUsoPzb63nYbzrEZwJnwgfhriRX70igpjm0uc-KYJFW1-C0Ge1s1UTwZX0JDxVI09jvfASDFFzqSDyFD0A_bsuN7AWTASAh9qMeSDmx3qL6wJeoCh6H5roXVg3qHqtDCABkBB3g",
"payload": ""
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/230178797927 HTTP/1.1" 200 800
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:59:03 GMT
Content-Type: application/json
Content-Length: 800
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: C400Npv_oRhfbFO37W_O1LzSGwULSrBgdjQ-OYg6APA_OFI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "edstestsite.site"
},
"status": "pending",
"expires": "2023-05-29T19:58:55Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/2fPTlg",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/LyzDYQ",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc"
}
]
}
Storing nonce: C400Npv_oRhfbFO37W_O1LzSGwULSrBgdjQ-OYg6APA_OFI
JWS payload:
b''
Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/230178797927:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyMjM2MjYxNyIsICJub25jZSI6ICJDNDAwTnB2X29SaGZiRk8zN1dfTzFMelNHd1VMU3JCZ2RqUS1PWWc2QVBBX09GSSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjMwMTc4Nzk3OTI3In0",
"signature": "BLr4HsBvGemlF1phlr008y_2-TOdtVCkd6Ofi37VrRBchRI8S8VAhGX2ST_pMrP4r5Rz6nar4BcUYEyA5bKMNbD2d_AM4Fxlu50Ag1jmo3Wvr40qJfFYvFl572f1oc24f5y9j16LtuUefiIFJuNBAbnc-ZH6Q8Lni3ATn_XEPquMSk-CZXeaFW4fFCxxkB3-m1bz6eYrRIsKp9QDImOFDDzCanKS2tE63QljoaHWeAfumDnI7tryL1LQ-pvivVWAlMT_oECLkW-Rn-DN7EOBSB2bX7u531APapzr2SGzH6BBLB4V536qNaiPKWzhozCYNKYi1e66QPUe9mV8YCssmA",
"payload": ""
}
https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/230178797927 HTTP/1.1" 200 1065
Received response:
HTTP 200
Server: nginx
Date: Mon, 22 May 2023 19:59:06 GMT
Content-Type: application/json
Content-Length: 1065
Connection: keep-alive
Boulder-Requester: 1122362617
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: C400XCeVFbV08W7WcblhEc2XkHg7XCQ2fol3q4uDwr1-RcE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "edstestsite.site"
},
"status": "invalid",
"expires": "2023-05-29T19:58:55Z",
"challenges": [
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:connection",
"detail": "72.211.171.252: Fetching http://edstestsite.site/.well-known/acme-challenge/RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc: Timeout during connect (likely firewall problem)",
"status": 400
},
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/230178797927/4R3CKQ",
"token": "RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc",
"validationRecord": [
{
"url": "http://edstestsite.site/.well-known/acme-challenge/RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc",
"hostname": "edstestsite.site",
"port": "80",
"addressesResolved": [
"72.211.171.252"
],
"addressUsed": "72.211.171.252"
}
],
"validated": "2023-05-22T19:58:55Z"
}
]
}
Storing nonce: C400XCeVFbV08W7WcblhEc2XkHg7XCQ2fol3q4uDwr1-RcE
Challenge failed for domain edstestsite.site
http-01 challenge for edstestsite.site
Notifying user:
Certbot failed to authenticate some domains (authenticator: standalone). The Certificate Authority reported these problems:
Domain: edstestsite.site
Type: connection
Detail: 72.211.171.252: Fetching http://edstestsite.site/.well-known/acme-challenge/RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc: Timeout during connect (likely firewall problem)
Hint: The Certificate Authority failed to download the challenge files from the temporary standalone webserver started by Certbot on port 80. Ensure that the listed domains point to this machine and that it can accept inbound connections from the internet.
Certbot failed to authenticate some domains (authenticator: standalone). The Certificate Authority reported these problems:
Domain: edstestsite.site
Type: connection
Detail: 72.211.171.252: Fetching http://edstestsite.site/.well-known/acme-challenge/RiIQp6SZbmnzRUWwV88vd6Q3Z4XeHigPhkEfHkzVXIc: Timeout during connect (likely firewall problem)
Hint: The Certificate Authority failed to download the challenge files from the temporary standalone webserver started by Certbot on port 80. Ensure that the listed domains point to this machine and that it can accept inbound connections from the internet.
Encountered exception:
Traceback (most recent call last):
File "C:\Program Files\Certbot\pkgs\certbot\_internal\auth_handler.py", line 108, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
File "C:\Program Files\Certbot\pkgs\certbot\_internal\auth_handler.py", line 212, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
Calling registered functions
Cleaning up challenges
Stopping server at :::80...
Stopping server at 0.0.0.0:80...
Exiting abnormally:
Traceback (most recent call last):
File "runpy.py", line 197, in _run_module_as_main
File "runpy.py", line 87, in _run_code
File "C:\Program Files\Certbot\bin\certbot.exe\__main__.py", line 29, in <module>
sys.exit(main())
File "C:\Program Files\Certbot\pkgs\certbot\main.py", line 19, in main
return internal_main.main(cli_args)
File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 1864, in main
return config.func(config, plugins)
File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 1597, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 141, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File "C:\Program Files\Certbot\pkgs\certbot\_internal\client.py", line 517, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
File "C:\Program Files\Certbot\pkgs\certbot\_internal\client.py", line 428, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "C:\Program Files\Certbot\pkgs\certbot\_internal\client.py", line 496, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
File "C:\Program Files\Certbot\pkgs\certbot\_internal\auth_handler.py", line 108, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
File "C:\Program Files\Certbot\pkgs\certbot\_internal\auth_handler.py", line 212, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
Some challenges have failed.
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile C:\Certbot\log\letsencrypt.log or re-run Certbot with -v for more details.
My web server is (include version):
Apache 2.4.56
The operating system my web server runs on is (include version):
Windows 10
My hosting provider, if applicable, is:
Personal machine
I can login to a root shell on my machine (yes or no, or I don't know):
Yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
NO
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot):
2.6.0