Thanks on swift reply.
What would you suggest to fix the error of getting renewed certificate?
i.e.
certbot certonly --nginx
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Which names would you like to activate HTTPS for?
We recommend selecting either all domains, or all domains in a VirtualHost/server block.
1: boreas.mywire.org
Select the appropriate numbers separated by commas and/or spaces, or leave input
blank to select all options shown (Enter 'c' to cancel): 1
Renewing an existing certificate for boreas.mywire.org
Certbot failed to authenticate some domains (authenticator: nginx). The Certificate Authority reported these problems:
Domain: boreas.mywire.org
Type: connection
Detail: During secondary validation: 49.194.167.107: Fetching http://boreas.mywire.org/.well-known/acme-challenge/Dgt9kW3DhD8mo07wGHcH1gE7iICe515m7efRipuxx0U: Timeout during connect (likely firewall problem)
Hint: The Certificate Authority failed to verify the temporary nginx configuration changes made by Certbot. Ensure the listed domains point to this nginx server and that it is accessible from the internet.
Some challenges have failed.
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details.
And this is the log:
... snip last part...
Server: nginx
Date: Fri, 20 Dec 2024 08:55:56 GMT
Content-Type: application/json
Content-Length: 194
Connection: keep-alive
Boulder-Requester: 693611057
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index", https://acme-v02.api.letsencrypt.org/acme/authz/693611057/447691542995;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall/693611057/447691542995/Zwa46g
Replay-Nonce: LPSR-4-ss_CuKFoxWf9u_tZlCw4bkX83LyFQRlPsRw5lQoHbzxk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/693611057/447691542995/Zwa46g",
"status": "pending",
"token": "DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hIRA"
}
2024-12-20 16:55:56,904:DEBUG:acme.client:Storing nonce: LPSR-4-ss_CuKFoxWf9u_tZlCw4bkX83LyFQRlPsRw5lQoHbzxk
2024-12-20 16:55:56,906:INFO:certbot._internal.auth_handler:Waiting for verification...
2024-12-20 16:55:57,907:DEBUG:acme.client:JWS payload:
b''
2024-12-20 16:55:57,926:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/693611057/447691542995:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjkzNjExMDU3IiwgIm5vbmNlIjogIkxQU1ItNC1zc19Dd
UtGb3hXZjl1X3RabEN3NGJrWDgzTHlGUVJsUHNSdzVsUW9IYnp4ayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovNjkzNjExMDU3LzQ0NzY5MTU0Mj
k5NSJ9",
"signature": "onQSzCQtFkqRQX48_1tcTVuNzWJ-iz3yV-fq3MrVL0XWW8VD4RHserj7kmSq5QnYOTmDI8uXm4imQqRTHYQGevvHz6hUoKIm2usdfbsWcS7drcaZN58pj4kVKuvvr7sTcmgF-6cKjMuEC
BxQn6iYdYoLOI2RD866KkI60Ft1a9aaF9K6eSup-DIzr1OTrQG9RmJX5Jws_g6ILl9OCDwIAVJFB0sI3npoTUsIiu_zZ9WtsuEp1Cw-yQRwGM7YCDKn7mOKjJPr7CtnVUYfzn-Xi9KmCMOx5YAEE3D-oW06CC
Lru-ZZIQNIGu0YPoZjT2a_XnJBqMqYJkTM8LEw3VKIUw",
"payload": ""
}
2024-12-20 16:55:58,342:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/693611057/447691542995 HTTP/1.1" 200 822
2024-12-20 16:55:58,344:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 20 Dec 2024 08:55:58 GMT
Content-Type: application/json
Content-Length: 822
Connection: keep-alive
Boulder-Requester: 693611057
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: LPSR-4-s8WWp1pscEqXJgwks3bxfVKuttCyvopmIUZ7hL-Q5p88
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "boreas.mywire.org"
},
"status": "pending",
"expires": "2024-12-27T08:55:54Z",
"challenges": [
{
"type": "tls-alpn-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/693611057/447691542995/6YpXgQ",
"status": "pending",
"token": "DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hIRA"
},
{
"type": "dns-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/693611057/447691542995/kKoeUA",
"status": "pending",
"token": "DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hIRA"
},
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/693611057/447691542995/Zwa46g",
"status": "pending",
"token": "DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hIRA"
}
]
}
2024-12-20 16:55:58,345:DEBUG:acme.client:Storing nonce: LPSR-4-s8WWp1pscEqXJgwks3bxfVKuttCyvopmIUZ7hL-Q5p88
2024-12-20 16:56:01,347:DEBUG:acme.client:JWS payload:
b''
2024-12-20 16:56:01,367:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/693611057/447691542995:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjkzNjExMDU3IiwgIm5vbmNlIjogIkxQU1ItNC1zOFdXc
DFwc2NFcVhKZ3drczNieGZWS3V0dEN5dm9wbUlVWjdoTC1RNXA4OCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovNjkzNjExMDU3LzQ0NzY5MTU0Mj
k5NSJ9",
"signature": "FhIEKjF2gstB7OMlHYtE9-_xe8PFnarEmBxfd5vkU_Z3bTWN0ANJN9DkLcGE7-TC1QoLbdO5q7OESpXCcoeXhmt9R8j0QWUcPSWPoIK-_bBMS3BvaN3mg5Lr3WYeMDDdoJ6Rf4Kuu4bxM
3BvL7pwQSmiuH3rEXXi5KgYLiWv8mTFa3n6FEbGCemGSrusejE71rU_oOtT4BdQDP5xhoh0AQIs98cP1XBrI-d4kwQ9pXpUvZwNaPGlJv8ykPyu8-ShylC7brBNUEJv-k70oZgH5ALkZ5jevHQ2C4gqC35wVi
GHIGY3kGzYrdoZSKOrqQ9jXvW3t2XJla8VcNQjstGKGw",
"payload": ""
}
2024-12-20 16:56:01,784:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/693611057/447691542995 HTTP/1.1" 200 822
2024-12-20 16:56:01,785:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 20 Dec 2024 08:56:01 GMT
Content-Type: application/json
Content-Length: 822
Connection: keep-alive
Boulder-Requester: 693611057
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: LPSR-4-sxjxfRu1o-j9wMUg-RbtDrB0EPIwcAt_Et750zWTuiF0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "boreas.mywire.org"
},
"status": "pending",
"expires": "2024-12-27T08:55:54Z",
"challenges": [
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/693611057/447691542995/Zwa46g",
"status": "pending",
"token": "DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hIRA"
},
{
"type": "tls-alpn-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/693611057/447691542995/6YpXgQ",
"status": "pending",
"token": "DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hIRA"
},
{
"type": "dns-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/693611057/447691542995/kKoeUA",
"status": "pending",
"token": "DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hIRA"
}
]
}
2024-12-20 16:56:01,786:DEBUG:acme.client:Storing nonce: LPSR-4-sxjxfRu1o-j9wMUg-RbtDrB0EPIwcAt_Et750zWTuiF0
2024-12-20 16:56:04,788:DEBUG:acme.client:JWS payload:
b''
2024-12-20 16:56:04,808:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/693611057/447691542995:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjkzNjExMDU3IiwgIm5vbmNlIjogIkxQU1ItNC1zeGp4Z
lJ1MW8tajl3TVVnLVJidERyQjBFUEl3Y0F0X0V0NzUweldUdWlGMCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovNjkzNjExMDU3LzQ0NzY5MTU0Mj
k5NSJ9",
"signature": "UeoQtLhQpd3bjU73czqIryc4LmmNFG_9Wq6sGVIQHGlBCADplCafdJvtOvQDAc6sdvWKa95OPGB5WWZoYrVCqFXX9GQh8KUcxs5OynyGdnRZC7Xfxp8iKwQBEZsVuPHKmsxN3qQTIEUwR
undl2zeOAjY_65O4SIQIp9s72ILtTwg4H5-dVJcxSMachsIAk9n9T8DNTewAoPr2kPu7Ju4Y8k5R0qM9Hh7HtZXIYpe8ufXV4qWvBSigpn2Nyv-boV2uExZO7mJXb_-c3W2CpL677OZ2-JeXKCiYJ1-teYpd9
m9aIntPhZlzVHQk0dOscfijCPXvNDy_hfo50KRRgnT1A",
"payload": ""
}
2024-12-20 16:56:05,224:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/693611057/447691542995 HTTP/1.1" 200 822
2024-12-20 16:56:05,226:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 20 Dec 2024 08:56:05 GMT
Content-Type: application/json
Content-Length: 822
Connection: keep-alive
Boulder-Requester: 693611057
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: LPSR-4-slQhKJdc8z-NOqQuc35IGJX1UMhwG4AE64XWaL6FsmnQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "boreas.mywire.org"
},
"status": "pending",
"expires": "2024-12-27T08:55:54Z",
"challenges": [
{
"type": "dns-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/693611057/447691542995/kKoeUA",
"status": "pending",
"token": "DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hIRA"
},
{
"type": "tls-alpn-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/693611057/447691542995/6YpXgQ",
"status": "pending",
"token": "DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hIRA"
},
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/693611057/447691542995/Zwa46g",
"status": "pending",
"token": "DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hIRA"
}
]
}
2024-12-20 16:56:05,227:DEBUG:acme.client:Storing nonce: LPSR-4-slQhKJdc8z-NOqQuc35IGJX1UMhwG4AE64XWaL6FsmnQ
2024-12-20 16:56:08,229:DEBUG:acme.client:JWS payload:
b''
2024-12-20 16:56:08,249:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/693611057/447691542995:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjkzNjExMDU3IiwgIm5vbmNlIjogIkxQU1ItNC1zbFFoS
0pkYzh6LU5PcVF1YzM1SUdKWDFVTWh3RzRBRTY0WFdhTDZGc21uUSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovNjkzNjExMDU3LzQ0NzY5MTU0Mj
k5NSJ9",
"signature": "sqomUIz0x2KkHA4g8899qUr5o3BrUplhR80nqVcOT_Q7a7FI6ROKdsMklppuUZVGwvJDthOXT78zoLhFafYkb8sEA-eQIvSSTP0WejSGZYH_fRE9wypvjHANAS6kUrWPtm3juN3TpXRwK
laXuh-ir7IaVUAuzpb8TRGh2DoQTDlH1XEBP2tbbzqy5WJA65oIVO1vXPBJGfVHduYxA2cjIB6BAgLNQ_L6MBtQ7LyX3lggzF9SjyqDebBl3rxSXpwpzJapQDcecZKwFAHOEPJd3kUA-kxkAXDy0OVD4cSewh
GfAmjRJlvCsR5V-iY80CLLOFOPwH5_EPzgGvCWy-8sRw",
"payload": ""
}
2024-12-20 16:56:08,664:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/693611057/447691542995 HTTP/1.1" 200 1105
2024-12-20 16:56:08,666:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 20 Dec 2024 08:56:08 GMT
Content-Type: application/json
Content-Length: 1105
Connection: keep-alive
Boulder-Requester: 693611057
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 1QDIi77btUk2XKJi5fx-Et0l8TEyOnccrwYsa3QR5YwyUywctJk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "boreas.mywire.org"
},
"status": "invalid",
"expires": "2024-12-27T08:55:54Z",
"challenges": [
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/693611057/447691542995/Zwa46g",
"status": "invalid",
"validated": "2024-12-20T08:55:56Z",
"error": {
"type": "urn:ietf:params:acme:error:connection",
"detail": "During secondary validation: 49.194.167.107: Fetching http://boreas.mywire.org/.well-known/acme-challenge/DIEDTfPk-Amov2gd6aavmvxK2IWHz8vh
ZQtzDH6hIRA: Timeout during connect (likely firewall problem)",
"status": 400
},
"token": "DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hIRA",
"validationRecord": [
{
"url": "http://boreas.mywire.org/.well-known/acme-challenge/DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hIRA",
"hostname": "boreas.mywire.org",
"port": "80",
"addressesResolved": [
"49.194.167.107"
],
"addressUsed": "49.194.167.107"
}
]
}
]
}
2024-12-20 16:56:08,667:DEBUG:acme.client:Storing nonce: 1QDIi77btUk2XKJi5fx-Et0l8TEyOnccrwYsa3QR5YwyUywctJk
2024-12-20 16:56:08,669:INFO:certbot._internal.auth_handler:Challenge failed for domain boreas.mywire.org
2024-12-20 16:56:08,669:INFO:certbot._internal.auth_handler:http-01 challenge for boreas.mywire.org
2024-12-20 16:56:08,670:DEBUG:certbot._internal.display.obj:Notifying user:
Certbot failed to authenticate some domains (authenticator: nginx). The Certificate Authority reported these problems:
Domain: boreas.mywire.org
Type: connection
Detail: During secondary validation: 49.194.167.107: Fetching http://boreas.mywire.org/.well-known/acme-challenge/DIEDTfPk-Amov2gd6aavmvxK2IWHz8vhZQtzDH6hI
RA: Timeout during connect (likely firewall problem)
Hint: The Certificate Authority failed to verify the temporary nginx configuration changes made by Certbot. Ensure the listed domains point to this nginx ser
ver and that it is accessible from the internet.
2024-12-20 16:56:08,674:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File "/snap/certbot/4194/lib/python3.12/site-packages/certbot/_internal/auth_handler.py", line 108, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
File "/snap/certbot/4194/lib/python3.12/site-packages/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2024-12-20 16:56:08,674:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-12-20 16:56:08,675:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-12-20 16:56:10,053:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "/snap/certbot/4194/bin/certbot", line 8, in
sys.exit(main())
^^^^^^
File "/snap/certbot/4194/lib/python3.12/site-packages/certbot/main.py", line 19, in main
return internal_main.main(cli_args)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4194/lib/python3.12/site-packages/certbot/_internal/main.py", line 1876, in main
return config.func(config, plugins)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4194/lib/python3.12/site-packages/certbot/_internal/main.py", line 1578, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4194/lib/python3.12/site-packages/certbot/_internal/main.py", line 130, in _get_and_save_cert
renewal.renew_cert(config, domains, le_client, lineage)
File "/snap/certbot/4194/lib/python3.12/site-packages/certbot/_internal/renewal.py", line 399, in renew_cert
new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4194/lib/python3.12/site-packages/certbot/_internal/client.py", line 428, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4194/lib/python3.12/site-packages/certbot/_internal/client.py", line 496, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4194/lib/python3.12/site-packages/certbot/_internal/auth_handler.py", line 108, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
File "/snap/certbot/4194/lib/python3.12/site-packages/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2024-12-20 16:56:10,073:ERROR:certbot._internal.log:Some challenges have failed.