Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: finefrau.tk
I ran this command: certbot certonly --config "/etc/letsencrypt.ini" --cert-name "npm-32" --agree-tos --authenticator webroot --email "my_mail@bugsbunny.fun" --preferred-challenges "dns,http" --domains "finefrau.tk"
It produced this output: Saving debug log to /var/log/letsencrypt/letsencrypt.log
Some challenges have failed.
My web server is (include version):
The operating system my web server runs on is (include version):
My hosting provider, if applicable, is:
I can login to a root shell on my machine (yes or no, or I don't know):
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):
Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
Domain: finefrau.tk
Type: unauthorized
Detail: 2606:4700:3036::6815:31fa: Invalid response from https://finefrau.tk/.well-known/acme-challenge/8ckTUYHQFPHw2dvPZd67Nz_iV2BvAjvcZUtJm4VfC3A: 522
You have your domain, finefrau.tk, proxied by Cloudflare. They are reporting (via a 522 error) that they can't connect to your backend server you have configured in Cloudflare.
You still need a certificate on the origin server behind Cloudflare. If you won't ever access the site directly, you can always use a Clouflate origin CA cert, but I prefer to use LE certs behind Cloudflare due to the globaly recognized CA.
In Cloudflare for your website, under SSL/TLS, choose the "Full" option instead of "Full (strict)". This will allow your origin certificate to be invalid until you fix it. You can set this back once you have fixed your server certificate. As long as you don't let it expire renewals should work normally.
Cheese and rice!! .... I did go through all settings again and figured out that I bonded two of my network interfaces some days ago. So everything is still the same with the slight difference that the mac adress of my bonded network does not match the mac adress of my previous ethernet connection.
That ended up for my router giving my server still the same IP address as usual, but the hostname has changed on router sides view... so it assumed it's not the same device anymore and did forward the ports to the "old" device, which from network perspective does not exist anymore...