My domain is: cloud.saccess.win
The operating system my web server runs on is ubuntu 22
I can login to a root shell on my machine: yes
I'm using a control panel to manage my site: no,
The version of my client is 2.5.0
I have installed nginx proxy manager on a docker container and when I try to get an ssl certificate i get the following error:
Error: Command failed: certbot certonly --config "/etc/letsencrypt.ini" --work-dir "/tmp/letsencrypt-lib" --logs-dir "/tmp/letsencrypt-log" --cert-name "npm-1" --agree-tos --authenticator webroot --email "shashankhrs@gmail.com" --preferred-challenges "dns,http" --domains "cloud.saccess.win"
Saving debug log to /tmp/letsencrypt-log/letsencrypt.log
Some challenges have failed.
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /tmp/letsencrypt-log/letsencrypt.log or re-run Certbot with -v for more details.at ChildProcess.exithandler (node:child_process:402:12) at ChildProcess.emit (node:events:513:28) at maybeClose (node:internal/child_process:1100:16) at Process.ChildProcess._handle.onexit (node:internal/child_process:304:5)
this is the error log
2023-09-27 14:32:39,332:DEBUG:certbot._internal.main:certbot version: 2.5.0
2023-09-27 14:32:39,333:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot
2023-09-27 14:32:39,333:DEBUG:certbot._internal.main:Arguments: ['--config', '/etc/letsencrypt.ini', '--work-dir', '/tmp/letsencrypt-lib', '--logs-dir', '/tmp/letsencrypt-log', '--cert-name', 'npm-1', '--agree-tos', '--authenticator', 'webroot', '--email', 'shashankhrs@gmail.com', '--preferred-challenges', 'dns,http', '--domains', 'cloud.saccess.win']
2023-09-27 14:32:39,333:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2023-09-27 14:32:39,340:DEBUG:certbot._internal.log:Root logging level set at 30
2023-09-27 14:32:39,340:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None
2023-09-27 14:32:39,342:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot
Description: Saves the necessary validation files to a .well-known/acme-challenge/ directory within the nominated webroot path. A seperate HTTP server must be running and serving files from the webroot path. HTTP challenge only (wildcards not supported).
Interfaces: Authenticator, Plugin
Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x7fef7e9de080>
Prep: True
2023-09-27 14:32:39,342:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.webroot.Authenticator object at 0x7fef7e9de080> and installer None
2023-09-27 14:32:39,342:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None
2023-09-27 14:32:39,383:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-09-27 14:32:39,384:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-09-27 14:32:43,859:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-09-27 14:32:43,861:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 27 Sep 2023 14:32:43 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"oDHxTu859bE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
"renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-09-27 14:32:43,861:DEBUG:acme.client:Requesting fresh nonce
2023-09-27 14:32:43,862:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-09-27 14:32:44,144:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-09-27 14:32:44,145:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 27 Sep 2023 14:32:43 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: TkV456YlOrTy1G4EtPBaSrlH8q3XUz1UOYjjiMeJoJzwladKPoo
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
2023-09-27 14:32:44,146:DEBUG:acme.client:Storing nonce: TkV456YlOrTy1G4EtPBaSrlH8q3XUz1UOYjjiMeJoJzwladKPoo
2023-09-27 14:32:44,147:DEBUG:acme.client:JWS payload:
b'{\n "contact": [\n "mailto:shashankhrs@gmail.com"\n ],\n "termsOfServiceAgreed": true\n}'
2023-09-27 14:32:44,155:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-acct:
{
"protected": "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",
"signature": "PsVw_URleOzMZiWh76Okg8IeUMGc-uej3aR1GpjcmWBEil2B1SancvUQhBlRvp9sYdLZndnb6cfRFJD9MdfCuvg1KGAefRJDk_WvUHaqbe2n5c4VJCclt2SHackdVLz18KII3TkqOVUvyGfs3IQVEQ8yEOP19rLrON5qneTplPgHxkdX7dA7kFNRvbFmzI3Btf0AYGM8JYjdBVHzCb2Wcztqp1xdDHVHSfTd98GJMoTJchjE2iC-279HhIxpxe3mWTu7DknidVYSiV1NCjiRPbLotcQzWKVkVcpVOmddvXXeNrniT3nA81LxjApEaEs6aNwksRybzKyvE9D9hLl0BQ",
"payload": "ewogICJjb250YWN0IjogWwogICAgIm1haWx0bzpzaGFzaGFua2hyc0BnbWFpbC5jb20iCiAgXSwKICAidGVybXNPZlNlcnZpY2VBZ3JlZWQiOiB0cnVlCn0"
}
2023-09-27 14:32:44,488:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-acct HTTP/1.1" 201 564
2023-09-27 14:32:44,489:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 27 Sep 2023 14:32:44 GMT
Content-Type: application/json
Content-Length: 564
Connection: keep-alive
Boulder-Requester: 1331720916
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf>;rel="terms-of-service"
Location: https://acme-v02.api.letsencrypt.org/acme/acct/1331720916
Replay-Nonce: HBbgH1zXoCcLtgsTVIGYq7VkXjwVAw2oMN1dJZJ4OOjjRhXHivA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"key": {
"kty": "RSA",
"n": "1NlIU4674CWQZs4Py79RCbt1mxYycSFuvwoLjsVh0lo0KLsGxm-khRB1medcFEFp1H30HOynABI_MzN4QquAEeGGK3TU1yi0x__3Eenzm4IG6-mddF4Odcn5hr-W8OXFQ-0_aOyxbNPACTSvoZYdRSUdeLR-6BwVb6anKo-MIZX-fMag6eTzj9vFECJ2YbaDwFmYFvtSGfqaBxWnIuT3405-aPEcjSX0FJE77lOrDxeNyXz0Ic44MzA2Ue0TC8KFlLs659evMJMjvFJY2291w8uhSBXryoyZnMzuZOfPgAzdB_b1fUw--G4i5eo3B5bZ8SLNIAg3Q-ORZE5gTWoy3Q",
"e": "AQAB"
},
"contact": [
"mailto:shashankhrs@gmail.com"
],
"initialIp": "xx.xx.xx.xx",
"createdAt": "2023-09-27T14:32:44.30158487Z",
"status": "valid"
}
2023-09-27 14:32:44,490:DEBUG:acme.client:Storing nonce: HBbgH1zXoCcLtgsTVIGYq7VkXjwVAw2oMN1dJZJ4OOjjRhXHivA
2023-09-27 14:32:44,494:DEBUG:certbot._internal.display.obj:Notifying user: Account registered.
2023-09-27 14:32:44,494:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=JWKRSA(key=<ComparableRSAKey(<cryptography.hazmat.backends.openssl.rsa._RSAPublicKey object at 0x7fef7e8c42b0>)>), contact=('mailto:shashankhrs@gmail.com',), agreement=None, status='valid', terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/1331720916', new_authzr_uri=None, terms_of_service='https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf'), e2dfc2c6f047378b21e2d0abef4d08f5, Meta(creation_dt=datetime.datetime(2023, 9, 27, 14, 32, 44, tzinfo=<UTC>), creation_host='421cdc00bf66', register_to_eff=None))>
2023-09-27 14:32:44,494:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for cloud.saccess.win
2023-09-27 14:32:44,497:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "cloud.saccess.win"\n }\n ]\n}'
2023-09-27 14:32:44,497:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMzMTcyMDkxNiIsICJub25jZSI6ICJIQmJnSDF6WG9DY0x0Z3NUVklHWXE3VmtYandWQXcyb01OMWRKWko0T09qalJoWEhpdkEiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9",
"signature": "qx7Rt9gI1KulVkSxnnVuN1wToYtdmM53OOV5bMj5T8b6vFB2ZOeiMqCmmG-M7auwrBwu3wvNbVTwhNPy2YqPP14H1Zp14i-P4pGbPUT5mTUuZ2dY7H2rwyHR-aWFSdstd7HvvTQl6nraWfIx6LLRfv9AThLo6j7PfYpXm-yh9-w1wdjQL8Rc7UWH6_jFauE56X-BdmSf-vdVWs-DlNTjn8YHvj332mJuMJOtoAdHghkmmFcZ-YLE4_rKwSUC9T57-YpHfNlh6i5npgPjSOEivHDzyMcF9Z_T13ZYvu7dzT2qI8r-QrovrcH9jfXdmS4Y9sBUFlI7sAGyjhnFFZ1PJw",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNsb3VkLnNhY2Nlc3Mud2luIgogICAgfQogIF0KfQ"
}
2023-09-27 14:32:45,104:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 343
2023-09-27 14:32:45,105:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 27 Sep 2023 14:32:44 GMT
Content-Type: application/json
Content-Length: 343
Connection: keep-alive
Boulder-Requester: 1331720916
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/1331720916/211241213366
Replay-Nonce: HBbgH1zX2IB47w5efCAP-nvUbw-VA2AD4-IlKw7TwTFPoG30IOs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "pending",
"expires": "2023-10-04T14:32:44Z",
"identifiers": [
{
"type": "dns",
"value": "cloud.saccess.win"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/268482358516"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1331720916/211241213366"
}
2023-09-27 14:32:45,105:DEBUG:acme.client:Storing nonce: HBbgH1zX2IB47w5efCAP-nvUbw-VA2AD4-IlKw7TwTFPoG30IOs
2023-09-27 14:32:45,108:DEBUG:acme.client:JWS payload:
b''
2023-09-27 14:32:45,109:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/268482358516:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMzMTcyMDkxNiIsICJub25jZSI6ICJIQmJnSDF6WDJJQjQ3dzVlZkNBUC1udlVidy1WQTJBRDQtSWxLdzdUd1RGUG9HMzBJT3MiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzI2ODQ4MjM1ODUxNiJ9",
"signature": "A7AHTk2hX-fCeF8rFji9aB3r91sR7tSW7ybzFUHjAxuKudrc-H2r-r6cF8Bl89AZ5rLo6IVIcwsLTblpminsvVk6sxj2auo4GzH2ul577ylnmMjAtmJqzAu9rc39Q374EjQMMtZZI7Q2I02ghbnIsnsunWMxgjQJhq70UsjpTKcGRLlDq2A9amdH8cP0oJoUWxJt8_jFVoCA485okbfafD8BQjKPvesumobV8JTrfHq0mKhQ4SvSMgXjtXPwblRmWNNWomnWt001iWyQkF8uLkCnogttXI6-yKm5bLzeUFWap43RLN-gfww0KbL7QFu0niwqiPyGHz7nARDe-Bo4kA",
"payload": ""
}
2023-09-27 14:32:45,393:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/268482358516 HTTP/1.1" 200 801
2023-09-27 14:32:45,394:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 27 Sep 2023 14:32:45 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 1331720916
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: TkV456Yl5cKHYQLzokKr1bM41xZdbLocd4xJbgAtM0cqFCzh00Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "cloud.saccess.win"
},
"status": "pending",
"expires": "2023-10-04T14:32:44Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/268482358516/QEkojA",
"token": "IPoZoDFuuy_s_rTY20XAWPZ-XJxoZx9-0UFPBp1nuiU"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/268482358516/EzoKpA",
"token": "IPoZoDFuuy_s_rTY20XAWPZ-XJxoZx9-0UFPBp1nuiU"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/268482358516/mh746w",
"token": "IPoZoDFuuy_s_rTY20XAWPZ-XJxoZx9-0UFPBp1nuiU"
}
]
}
2023-09-27 14:32:45,394:DEBUG:acme.client:Storing nonce: TkV456Yl5cKHYQLzokKr1bM41xZdbLocd4xJbgAtM0cqFCzh00Y
2023-09-27 14:32:45,395:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-09-27 14:32:45,395:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.saccess.win
2023-09-27 14:32:45,396:INFO:certbot._internal.plugins.webroot:Using the webroot path /data/letsencrypt-acme-challenge for all unmatched domains.
2023-09-27 14:32:45,396:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /data/letsencrypt-acme-challenge/.well-known/acme-challenge
2023-09-27 14:32:45,402:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /data/letsencrypt-acme-challenge/.well-known/acme-challenge/IPoZoDFuuy_s_rTY20XAWPZ-XJxoZx9-0UFPBp1nuiU
2023-09-27 14:32:45,403:DEBUG:acme.client:JWS payload:
b'{}'
2023-09-27 14:32:45,407:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/268482358516/QEkojA:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMzMTcyMDkxNiIsICJub25jZSI6ICJUa1Y0NTZZbDVjS0hZUUx6b2tLcjFiTTQxeFpkYkxvY2Q0eEpiZ0F0TTBjcUZDemgwMFkiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzI2ODQ4MjM1ODUxNi9RRWtvakEifQ",
"signature": "OmS3ouKbQBJnHFjuJgCuLHXflG2TPpqnQzRGJz9YpJbEtRduoqdqFD81uHdQykESfoFYw_SZ2eZmqbFrnFiEVBMG-OlV5iI8AXXqBbWMUEk_I86aTnJ9MD4Y08QEV8hPB-zIEX4e-ExJwuagV2YF1FyGy8AjNHNzUwBROxHmFs8UK2SK8hOEZy8NJh3cZamxM_qHwqRkG7TS9lPjxvBDv0QU-bpsEWItpy9QUc0wDot7_ZN1_4p8E9EtiDKyjhVmQuRvNR8UDQW4BBsFmShFG1njBd1SFyxJYHmLPQWpeJinHLCHfQ1sep9YnXQFCIms1TvSKwrch_4-EvGcOuZakg",
"payload": "e30"
}
2023-09-27 14:32:45,699:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/268482358516/QEkojA HTTP/1.1" 200 187
2023-09-27 14:32:45,700:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 27 Sep 2023 14:32:45 GMT
Content-Type: application/json
Content-Length: 187
Connection: keep-alive
Boulder-Requester: 1331720916
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz-v3/268482358516>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/268482358516/QEkojA
Replay-Nonce: HBbgH1zXahhl8GAQIyYwPyL_ZLinJjI6_LGYVJTC51rZF3qn0f4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/268482358516/QEkojA",
"token": "IPoZoDFuuy_s_rTY20XAWPZ-XJxoZx9-0UFPBp1nuiU"
}
2023-09-27 14:32:45,700:DEBUG:acme.client:Storing nonce: HBbgH1zXahhl8GAQIyYwPyL_ZLinJjI6_LGYVJTC51rZF3qn0f4
2023-09-27 14:32:45,701:INFO:certbot._internal.auth_handler:Waiting for verification...
2023-09-27 14:32:46,702:DEBUG:acme.client:JWS payload:
b''
2023-09-27 14:32:46,706:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/268482358516:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMzMTcyMDkxNiIsICJub25jZSI6ICJIQmJnSDF6WGFoaGw4R0FRSXlZd1B5TF9aTGluSmpJNl9MR1lWSlRDNTFyWkYzcW4wZjQiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzI2ODQ4MjM1ODUxNiJ9",
"signature": "NQ06BQF1B54oPBiO5wL41t6c-vGibBSNx8duTwcffkhgp8cmI2i0Ikve3-qI30Zl01EhzE5-4hYeVCNQ-OScH0ilyf8kyW13eeC2ZXwALEpHZe0CQ6W23m594b5qGrxcAnLpny8LWYUNiYKKciQMFdiYhDhAdzXdXkEbp7MfJARGYBBQEl99K70svGTkhU-rTvX7S5HHtbeBwfvMpoJxapY26asuSRNf19gkZgr9mYUgVG3noto8FKR5452xksxU_e18ZzGax-4aj_yWBZ-TLaXrhrjSiMOhR1HxzmUvDONJznvHF7UskQ8__wrx7VpsR3hES2gxJH-8fd3cOAD13g",
"payload": ""
}
2023-09-27 14:32:47,001:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/268482358516 HTTP/1.1" 200 1039
2023-09-27 14:32:47,002:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 27 Sep 2023 14:32:46 GMT
Content-Type: application/json
Content-Length: 1039
Connection: keep-alive
Boulder-Requester: 1331720916
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HBbgH1zXtiM9tgK92S7ArMkLJNXXG15UZhiylj3NaeJFiDlGyzU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "cloud.saccess.win"
},
"status": "invalid",
"expires": "2023-10-04T14:32:44Z",
"challenges": [
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:unauthorized",
"detail": "xx.xx.xx.xx: Invalid response from http://cloud.saccess.win/.well-known/acme-challenge/IPoZoDFuuy_s_rTY20XAWPZ-XJxoZx9-0UFPBp1nuiU: 404",
"status": 403
},
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/268482358516/QEkojA",
"token": "IPoZoDFuuy_s_rTY20XAWPZ-XJxoZx9-0UFPBp1nuiU",
"validationRecord": [
{
"url": "http://cloud.saccess.win/.well-known/acme-challenge/IPoZoDFuuy_s_rTY20XAWPZ-XJxoZx9-0UFPBp1nuiU",
"hostname": "cloud.saccess.win",
"port": "80",
"addressesResolved": [
"xx.xx.xx.xx"
],
"addressUsed": "xx.xx.xx.xx"
}
],
"validated": "2023-09-27T14:32:45Z"
}
]
}
2023-09-27 14:32:47,003:DEBUG:acme.client:Storing nonce: HBbgH1zXtiM9tgK92S7ArMkLJNXXG15UZhiylj3NaeJFiDlGyzU
2023-09-27 14:32:47,004:INFO:certbot._internal.auth_handler:Challenge failed for domain cloud.saccess.win
2023-09-27 14:32:47,004:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.saccess.win
2023-09-27 14:32:47,004:DEBUG:certbot._internal.display.obj:Notifying user:
Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
Domain: cloud.saccess.win
Type: unauthorized
Detail: xx.xx.xx.xx: Invalid response from http://cloud.saccess.win/.well-known/acme-challenge/IPoZoDFuuy_s_rTY20XAWPZ-XJxoZx9-0UFPBp1nuiU: 404
Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.
2023-09-27 14:32:47,005:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/auth_handler.py", line 108, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2023-09-27 14:32:47,005:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-09-27 14:32:47,006:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-09-27 14:32:47,006:DEBUG:certbot._internal.plugins.webroot:Removing /data/letsencrypt-acme-challenge/.well-known/acme-challenge/IPoZoDFuuy_s_rTY20XAWPZ-XJxoZx9-0UFPBp1nuiU
2023-09-27 14:32:47,007:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up
2023-09-27 14:32:47,007:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 8, in <module>
sys.exit(main())
File "/opt/certbot/lib/python3.7/site-packages/certbot/main.py", line 19, in main
return internal_main.main(cli_args)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/main.py", line 1864, in main
return config.func(config, plugins)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/main.py", line 1597, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/main.py", line 141, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/client.py", line 516, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/client.py", line 428, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/client.py", line 496, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/auth_handler.py", line 108, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2023-09-27 14:32:47,010:ERROR:certbot._internal.log:Some challenges have failed.
my server is behind a wireguard vpn self hosted on a vps and my pc and server are on the same network (wireguard vpn)
required ports are open in ufw and iptables.
Please help me troubleshoot this