New Setup Authorization Error

I created a test file and can access it. It seems to be failing the http-01 but I can't figure out why. Any help would be greatly appreciated.

My domain is:


I ran this command:
certbot certonly --webroot
It produced this output:

Blockquote 2020-12-30 12:01:44,746:DEBUG:certbot._internal.main:certbot version: 1.7.0
2020-12-30 12:01:44,746:DEBUG:certbot._internal.main:Arguments: ['--webroot']
2020-12-30 12:01:44,746:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2020-12-30 12:01:44,809:DEBUG:certbot._internal.log:Root logging level set at 20
2020-12-30 12:01:44,809:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2020-12-30 12:01:44,809:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None
2020-12-30 12:01:44,824:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot
Description: Place files in webroot directory
Interfaces: IAuthenticator, IPlugin
Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x037AB5B0>
Prep: True
2020-12-30 12:01:44,824:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.webroot.Authenticator object at 0x037AB5B0> and installer None
2020-12-30 12:01:44,824:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None
2020-12-30 12:01:44,840:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/95419129', new_authzr_uri=None, terms_of_service=None), c110f8a4ea4e2c9c93d833f32492efbd, Meta(creation_dt=datetime.datetime(2020, 8, 31, 17, 45, 14, tzinfo=), creation_host='coc-web-srv.CLERK-EBR.com', register_to_eff=None))>
2020-12-30 12:01:44,840:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2020-12-30 12:01:44,840:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2020-12-30 12:01:45,105:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
2020-12-30 12:01:45,105:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 30 Dec 2020 18:01:45 GMT
Content-Type: application/json
Content-Length: 658
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
"v3nVtH8xiVY": "Adding random entries to the directory"
}
2020-12-30 12:01:45,105:DEBUG:certbot.display.ops:No installer, picking names manually
2020-12-30 12:01:49,099:INFO:certbot._internal.main:Obtaining a new certificate
2020-12-30 12:01:49,489:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\0025_key-certbot.pem
2020-12-30 12:01:49,567:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\0025_csr-certbot.pem
2020-12-30 12:01:49,567:DEBUG:acme.client:Requesting fresh nonce
2020-12-30 12:01:49,567:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2020-12-30 12:01:49,629:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2020-12-30 12:01:49,629:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 30 Dec 2020 18:01:49 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 0104MMptLMeGebdE3I9KsJQ3XMlY5BhmqoU3ajVLJeJjIII
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

2020-12-30 12:01:49,629:DEBUG:acme.client:Storing nonce: 0104MMptLMeGebdE3I9KsJQ3XMlY5BhmqoU3ajVLJeJjIII
2020-12-30 12:01:49,629:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "electiontraining.ebrclerkofcourt.org"\n }\n ]\n}'
2020-12-30 12:01:49,645:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU0MTkxMjkiLCAibm9uY2UiOiAiMDEwNE1NcHRMTWVHZWJkRTNJOUtzSlEzWE1sWTVCaG1xb1UzYWpWTEplSmpJSUkiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9",
"signature": "d2fFR7AVYO34atAxFVDN8iOWrfndKJ4E4yoTjLHmZH58A0ntLb3BgcFVYvg5Hb8b9C4-bZTWa3rkWEnMDXEPgOCCwIWZfezHmQ4RcikvNnXWKyu2IRYZ-aU469yLq8l9LdGdLjxIN5vofyZ22MOhvA5FbsXmm3LPNeQ_efHni0fehBWrlEWTE06qseYvVO2lPujMOQGCjNQg5BK-6RCrgGzB3e60Idf7E3DAkpiXDl4LEQsy-pKwh_1TCeJ1bDKVIsT5rrCcdOiOgPGyoVPij9gcNXT97w_tCzdPBcXrs1gnEbkIpkCt6eJJ88jeSqd6WubTV7wXdFTiUbabMO6NUA",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImVsZWN0aW9udHJhaW5pbmcuZWJyY2xlcmtvZmNvdXJ0Lm9yZyIKICAgIH0KICBdCn0"
}
2020-12-30 12:01:49,879:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 366
2020-12-30 12:01:49,879:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 30 Dec 2020 18:01:49 GMT
Content-Type: application/json
Content-Length: 366
Connection: keep-alive
Boulder-Requester: 95419129
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/95419129/7030822259
Replay-Nonce: 0103Ab-S4b3u1Ek7PdEkt__bZoulCDDsEWCIEJz5NNco2O0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"status": "pending",
"expires": "2021-01-06T18:01:49.841515252Z",
"identifiers": [
{
"type": "dns",
"value": "electiontraining.ebrclerkofcourt.org"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/9695910672"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/95419129/7030822259"
}
2020-12-30 12:01:49,879:DEBUG:acme.client:Storing nonce: 0103Ab-S4b3u1Ek7PdEkt__bZoulCDDsEWCIEJz5NNco2O0
2020-12-30 12:01:49,879:DEBUG:acme.client:JWS payload:
b''
2020-12-30 12:01:49,894:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/9695910672:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU0MTkxMjkiLCAibm9uY2UiOiAiMDEwM0FiLVM0YjN1MUVrN1BkRWt0X19iWm91bENERHNFV0NJRUp6NU5OY28yTzAiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzk2OTU5MTA2NzIifQ",
"signature": "uB53FPx3YhNsKNYgcoUykRDYEFWBeYTJ9ipMFAayL-UfTgJPrPyegY6RJ8ML5WkHLqxhDLsksM9Tlwj7-TlkkP5wMgNL9b0QL5hR0CX_qhZ68FhCuDk_0mj_xs43GgHPE9_Kg4A2ZnRnzbs6rELKDXYbW3a5MbT-rxSuHLUZR6yI9wkw0rnu434XoLSAX3GQW0Ng8OHcFOHtBZNOmmyHrl8SphwBZT90Ljzuvbgcvqi199HQXPbb57rly95lLfbfklqhcCH1hAlWmBt9xyC2I2b-82ShtuEtHkMYF_m1l1e8_lk1hY_WIvQ-3bcPCrwtqSsb2ZpQWNCCSR9jlCD7YA",
"payload": ""
}
2020-12-30 12:01:49,988:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/9695910672 HTTP/1.1" 200 814
2020-12-30 12:01:49,988:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 30 Dec 2020 18:01:49 GMT
Content-Type: application/json
Content-Length: 814
Connection: keep-alive
Boulder-Requester: 95419129
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 0103hnqTE43Ni5z7kyfKcYmsCVVJ8CCL8Sc-DCl2H4aBxIg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "electiontraining.ebrclerkofcourt.org"
},
"status": "pending",
"expires": "2021-01-06T18:01:49Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/9695910672/FXjW6A",
"token": "3uCmJNSFG4UjKk0B2gJOQ3MLiknRFU7AbkIGre9Cclg"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/9695910672/Yy93Lw",
"token": "3uCmJNSFG4UjKk0B2gJOQ3MLiknRFU7AbkIGre9Cclg"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/9695910672/r1N79g",
"token": "3uCmJNSFG4UjKk0B2gJOQ3MLiknRFU7AbkIGre9Cclg"
}
]
}
2020-12-30 12:01:49,988:DEBUG:acme.client:Storing nonce: 0103hnqTE43Ni5z7kyfKcYmsCVVJ8CCL8Sc-DCl2H4aBxIg
2020-12-30 12:01:50,004:INFO:certbot._internal.auth_handler:Performing the following challenges:
2020-12-30 12:01:50,004:INFO:certbot._internal.auth_handler:http-01 challenge for electiontraining.ebrclerkofcourt.org
2020-12-30 12:01:52,593:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at D:\wwwroot_internal\ElectionTraining.well-known/acme-challenge
2020-12-30 12:01:52,609:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to D:\wwwroot_internal\ElectionTraining.well-known/acme-challenge\3uCmJNSFG4UjKk0B2gJOQ3MLiknRFU7AbkIGre9Cclg
2020-12-30 12:01:52,609:INFO:certbot._internal.auth_handler:Waiting for verification...
2020-12-30 12:01:52,609:DEBUG:acme.client:JWS payload:
b'{}'
2020-12-30 12:01:52,609:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/9695910672/FXjW6A:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU0MTkxMjkiLCAibm9uY2UiOiAiMDEwM2hucVRFNDNOaTV6N2t5ZktjWW1zQ1ZWSjhDQ0w4U2MtRENsMkg0YUJ4SWciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzk2OTU5MTA2NzIvRlhqVzZBIn0",
"signature": "oR7Lo0iYlYkKtK-txD590Rce8bbjE6isSazu9MbzKdXEwy5JXItkU3Cx7JiCa2BxDhr9g4GCoJkG6WIPeS7-eCx8PSaxKZz-cjkkDD5sm_EmzC6Ixebhx-Vs75dt7pnnLhI8hNQQXIAooR9EF7wwjtq9qb3MnmHt2fdFVrMxBIVfM9M4pKjxaJTmkTeWWRxUon7tpFHT-q36G4S7kgEI8pbhCDz_Eh3NYx3rQVOXQVFBFuaEroTVILsh_9RG1toiNTfcgRX0HfY8TBUK0Aq_TzmGW-GLtzhbt8zrrL0svvl6SVoF-2rvN5ykpoHF1Y7MolUDNQaCwxaiDob8aSDAjQ",
"payload": "e30"
}
2020-12-30 12:01:52,718:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/9695910672/FXjW6A HTTP/1.1" 200 185
2020-12-30 12:01:52,718:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 30 Dec 2020 18:01:52 GMT
Content-Type: application/json
Content-Length: 185
Connection: keep-alive
Boulder-Requester: 95419129
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index", https://acme-v02.api.letsencrypt.org/acme/authz-v3/9695910672;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/9695910672/FXjW6A
Replay-Nonce: 0103bZfvWENJZBxn-3qv99B1Vo5QSqrBr6b-YikMoJIcOnI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/9695910672/FXjW6A",
"token": "3uCmJNSFG4UjKk0B2gJOQ3MLiknRFU7AbkIGre9Cclg"
}
2020-12-30 12:01:52,718:DEBUG:acme.client:Storing nonce: 0103bZfvWENJZBxn-3qv99B1Vo5QSqrBr6b-YikMoJIcOnI
2020-12-30 12:01:53,732:DEBUG:acme.client:JWS payload:
b''
2020-12-30 12:01:53,748:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/9695910672:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU0MTkxMjkiLCAibm9uY2UiOiAiMDEwM2JaZnZXRU5KWkJ4bi0zcXY5OUIxVm81UVNxckJyNmItWWlrTW9KSWNPbkkiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzk2OTU5MTA2NzIifQ",
"signature": "U-iYE4mQ_pfI7XoOBxKEnxKbkfTN90y_4pfYKyl2wsyjg6sDYXHlpKhCf9NQnXRcW0YmPgnYJl6l25cWQhnRLxixVZcMThuDbRXu9WdCaSc4IockWtS7DUPVsL5BX_H2m_Ra9iLS0ypzkUpEsqDq4PXWhbbvAUlWsHhkOC5E3GhOUiJbsptWGRux5MrEYqx7wh_qGPvcwqf3fmWkpjot0utU-foxTTzOtWy2fD-3X66hgsHfNtM6Zm5xAp2UMz1BmhJCErLglxGLncclsAtBbew4LgrZST6aGxMRlrguW-x1rfCus97reRpwpgoUecvG52bcHBTu6dTlRX0eLUdUvg",
"payload": ""
}
2020-12-30 12:01:53,826:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/9695910672 HTTP/1.1" 200 1231
2020-12-30 12:01:53,826:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 30 Dec 2020 18:01:53 GMT
Content-Type: application/json
Content-Length: 1231
Connection: keep-alive
Boulder-Requester: 95419129
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 0103jGc_nH9MR8gGPw9psKLbxM1dmGQTZxeVh2Zz2oUHNQw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "electiontraining.ebrclerkofcourt.org"
},
"status": "invalid",
"expires": "2021-01-06T18:01:49Z",
"challenges": [
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:unauthorized",
"detail": "Invalid response from http://electiontraining.ebrclerkofcourt.org/.well-known/acme-challenge/3uCmJNSFG4UjKk0B2gJOQ3MLiknRFU7AbkIGre9Cclg [72.159.96.155]: "\u003c!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\"\u003e\r\n\u003chtml xmlns=\"http"",
"status": 403
},
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/9695910672/FXjW6A",
"token": "3uCmJNSFG4UjKk0B2gJOQ3MLiknRFU7AbkIGre9Cclg",
"validationRecord": [
{
"url": "http://electiontraining.ebrclerkofcourt.org/.well-known/acme-challenge/3uCmJNSFG4UjKk0B2gJOQ3MLiknRFU7AbkIGre9Cclg",
"hostname": "electiontraining.ebrclerkofcourt.org",
"port": "80",
"addressesResolved": [
"72.159.96.155"
],
"addressUsed": "72.159.96.155"
}
]
}
]
}
2020-12-30 12:01:53,841:DEBUG:acme.client:Storing nonce: 0103jGc_nH9MR8gGPw9psKLbxM1dmGQTZxeVh2Zz2oUHNQw
2020-12-30 12:01:53,841:WARNING:certbot._internal.auth_handler:Challenge failed for domain electiontraining.ebrclerkofcourt.org
2020-12-30 12:01:53,841:INFO:certbot._internal.auth_handler:http-01 challenge for electiontraining.ebrclerkofcourt.org
2020-12-30 12:01:53,841:DEBUG:certbot._internal.reporter:Reporting to user: The following errors were reported by the server:

Domain: electiontraining.ebrclerkofcourt.org
Type: unauthorized
Detail: Invalid response from http://electiontraining.ebrclerkofcourt.org/.well-known/acme-challenge/3uCmJNSFG4UjKk0B2gJOQ3MLiknRFU7AbkIGre9Cclg [72.159.96.155]: "\r\n<html xmlns="http"

To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address.
2020-12-30 12:01:53,841:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File "C:\Program Files (x86)\Certbot\pkgs\certbot_internal\auth_handler.py", line 91, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File "C:\Program Files (x86)\Certbot\pkgs\certbot_internal\auth_handler.py", line 180, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

2020-12-30 12:01:53,841:DEBUG:certbot._internal.error_handler:Calling registered functions
2020-12-30 12:01:53,841:INFO:certbot._internal.auth_handler:Cleaning up challenges
2020-12-30 12:01:53,841:DEBUG:certbot._internal.plugins.webroot:Removing D:\wwwroot_internal\ElectionTraining.well-known/acme-challenge\3uCmJNSFG4UjKk0B2gJOQ3MLiknRFU7AbkIGre9Cclg
2020-12-30 12:01:53,841:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up
2020-12-30 12:01:53,841:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in run_code
File "C:\Program Files (x86)\Certbot\bin\certbot.exe_main
.py", line 33, in
sys.exit(main())
File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
return internal_main.main(cli_args)
File "C:\Program Files (x86)\Certbot\pkgs\certbot_internal\main.py", line 1357, in main
return config.func(config, plugins)
File "C:\Program Files (x86)\Certbot\pkgs\certbot_internal\main.py", line 1237, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File "C:\Program Files (x86)\Certbot\pkgs\certbot_internal\main.py", line 121, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File "C:\Program Files (x86)\Certbot\pkgs\certbot_internal\client.py", line 418, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
File "C:\Program Files (x86)\Certbot\pkgs\certbot_internal\client.py", line 351, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "C:\Program Files (x86)\Certbot\pkgs\certbot_internal\client.py", line 398, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
File "C:\Program Files (x86)\Certbot\pkgs\certbot_internal\auth_handler.py", line 91, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File "C:\Program Files (x86)\Certbot\pkgs\certbot_internal\auth_handler.py", line 180, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2020-12-30 12:01:53,841:ERROR:certbot._internal.log:Some challenges have failed.

My web server is (include version):
IIS 7.5

The operating system my web server runs on is (include version):
Windows Server 2008 R2

My hosting provider, if applicable, is:
NA

I can login to a root shell on my machine (yes or no, or I don't know):
Yes

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot): 1.7.0

1 Like

Attempting to save validation to D:\wwwroot_internal\ElectionTraining\.well-known/acme-challenge\3uCmJNSFG4UjKk0B2gJOQ3MLiknRFU7AbkIGre9Cclg

Could you please try create these two files, to see whether they are accessible via browser:

  • D:\wwwroot_internal\ElectionTraining\.well-known\acme-challenge\test
  • D:\wwwroot_internal\ElectionTraining\.well-known\acme-challenge\test.txt

You might also have to create a web.config file at D:\wwwroot_internal\ElectionTraining\.well-known\acme-challenge\web.config to allow extensionless files in IIS:

<?xml version="1.0" encoding="UTF-8"?>
 <configuration>
     <system.webServer>
         <staticContent>
             <mimeMap fileExtension=".*" mimeType="text/plain" />
         </staticContent>
     </system.webServer>
 </configuration>
1 Like

I created both files and can see the test.txt but not the non-extension file. I also created the web.config file and instead of getting the 404 file not found, I now get 500 Internal error. Do I need to be able to see the non-extension file in order for it to work correctly?

Correction, after I created the web.config I got the 500 error. Removing the web.config I am once again able to see the test.txt file but not the non-extension test file.

Found the answer in IIS.

Within IIS go to the acme-challenge folder in the website and click on it.

To the right under IIS MIME types click add and type a period "." for the File name extension and for MIME type "text/plain". This will allow the reading of non-extension files for that folder.