Hi all, I am currently trying to set up a reverse proxy so that my Overseerr (among other containers) are accessible for other users of my media server. I am very new to all of this so I will do my best to explain what I have done, thank you for your patience if I am not particularly adept at explaining my issue.
I am attempting to generate the certificate using Nginx-Proxy-Manager-Official Container from mgutts repository on UnraidOS 6.9.2, my domain is hosted with Google Domains. I have a DDNS setup with DDclient, and I have a CNAME record of overseer.kesutu.net pointing to kesutu.net for data.
I have forwarded my ports on 80 and 443 on my router to the Static IP of my server.
I have attached the logs of the issue below, I have scoured the internet for a myriad of answers and I cannot find one that provides a solution. I think one guy generated his own OpenSSL certificate and imported and bypassed the certificate generation.
Some have suggested it may be a permissions issue, if so I am not sure how to resolve it as I am very new to Docker containers and I as far as I can understand it, I have mounted the volume correctly and the file has been created and permission of the folder is set to 0777.
My domain is: overseer.kesutu.net
I ran this command: On Nginx Proxy Manager, I attempted to create a new proxy host with the following settings (on advice of the overseerr documentation)
Domain Name: overseerr.kesutu.net
Scheme: http
Forward Hostname / IP: 192.168.50.200
Forward Port: 5055
Cache Assets: Yes
Block Common Exploits: Yes
SSL Certificate: Request a new SSL Certificate
Force SSL: Yes
HTTP/2 Support: Yes
It produced this output:
2022-04-03 02:02:56,112:DEBUG:certbot._internal.main:certbot version: 1.25.0
2022-04-03 02:02:56,112:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot
2022-04-03 02:02:56,112:DEBUG:certbot._internal.main:Arguments: ['--config', '/etc/letsencrypt.ini', '--cert-name', 'npm-25', '--agree-tos', '--authenticator', 'webroot', '--email', 'kesutu@live.com.au', '--preferred-challenges', 'dns,http', '--domains', 'overseerr.kesutu.net']
2022-04-03 02:02:56,112:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2022-04-03 02:02:56,122:DEBUG:certbot._internal.log:Root logging level set at 30
2022-04-03 02:02:56,123:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None
2022-04-03 02:02:56,125:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot
Description: Place files in webroot directory
Interfaces: Authenticator, Plugin
Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x14ccb00a5828>
Prep: True
2022-04-03 02:02:56,126:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.webroot.Authenticator object at 0x14ccb00a5828> and installer None
2022-04-03 02:02:56,126:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None
2022-04-03 02:02:56,129:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/479034450', new_authzr_uri=None, terms_of_service=None), 70ed5ca3963386c9cd986b3a95bba8d4, Meta(creation_dt=datetime.datetime(2022, 4, 2, 3, 40, 28, tzinfo=), creation_host='86bac4368e76', register_to_eff=None))>
2022-04-03 02:02:56,129:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2022-04-03 02:02:56,152:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2022-04-03 02:02:56,778:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
2022-04-03 02:02:56,778:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 03 Apr 2022 09:02:56 GMT
Content-Type: application/json
Content-Length: 658
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"EFZHvKX8rAw": "Adding random entries to the directory",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2022-04-03 02:02:56,779:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for overseerr.kesutu.net
2022-04-03 02:02:56,781:DEBUG:certbot.crypto_util:Generating ECDSA key (2048 bits): /etc/letsencrypt/keys/0002_key-certbot.pem
2022-04-03 02:02:56,801:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0002_csr-certbot.pem
2022-04-03 02:02:56,802:DEBUG:acme.client:Requesting fresh nonce
2022-04-03 02:02:56,802:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2022-04-03 02:02:57,007:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2022-04-03 02:02:57,008:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 03 Apr 2022 09:02:56 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 0001PJ_k-VDhUtLjcTc1qcfUHMpuCV0ENUykI6yR7HHvHqc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
2022-04-03 02:02:57,008:DEBUG:acme.client:Storing nonce: 0001PJ_k-VDhUtLjcTc1qcfUHMpuCV0ENUykI6yR7HHvHqc
2022-04-03 02:02:57,008:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "overseerr.kesutu.net"\n }\n ]\n}'
2022-04-03 02:02:57,009:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNDc5MDM0NDUwIiwgIm5vbmNlIjogIjAwMDFQSl9rLVZEaFV0TGpjVGMxcWNmVUhNcHVDVjBFTlV5a0k2eVI3SEh2SHFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
"signature": "JUnhHE9Krch8Lkbzpl57pXc7N_lSZb2IFOJU9VgGths59lHdR11QD8egHBDni8zmyTkOQPhItqSFZrprpMmEWTpmP85LEeTtoUZAQHVkqjlh_1P6Rv3HlF4LX7iieEbs3Gp20pB5gTLlolp1nCzTqAkt5fveVs7wYDkU-31zBCaiIZAIEw__vpTs7TrElS05ejAAh-ZsPTS0sBvfmeqVHkif2yC03SFGbQt0qB2uXWBud2glo3LO86ea4-bzjKvxFON6_5AJNIEB2CJmpLb7m1R6jGuwLLL5echKHptUOmARkGOJPaGdQztC5oXJNce5DaDhQu1IeBkKUAm_xXt9bA",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm92ZXJzZWVyci5rZXN1dHUubmV0IgogICAgfQogIF0KfQ"
}
2022-04-03 02:02:57,248:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 343
2022-04-03 02:02:57,248:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 03 Apr 2022 09:02:57 GMT
Content-Type: application/json
Content-Length: 343
Connection: keep-alive
Boulder-Requester: 479034450
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/479034450/76934905890
Replay-Nonce: 0002tOO5a7_gQnrbJyto_t5XQQkYUfECM_Gd7jCOMwhNPKQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "pending",
"expires": "2022-04-10T09:02:57Z",
"identifiers": [
{
"type": "dns",
"value": "overseerr.kesutu.net"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/94342177390"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/479034450/76934905890"
}
2022-04-03 02:02:57,249:DEBUG:acme.client:Storing nonce: 0002tOO5a7_gQnrbJyto_t5XQQkYUfECM_Gd7jCOMwhNPKQ
2022-04-03 02:02:57,249:DEBUG:acme.client:JWS payload:
b''
2022-04-03 02:02:57,250:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/94342177390:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNDc5MDM0NDUwIiwgIm5vbmNlIjogIjAwMDJ0T081YTdfZ1FucmJKeXRvX3Q1WFFRa1lVZkVDTV9HZDdqQ09Nd2hOUEtRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My85NDM0MjE3NzM5MCJ9",
"signature": "xbStB_QGZeqY00YU-oxcl1aWWIquftUONKgdsyQlSx2nGQn27hEN9WI549z4fIJW7NIotyBT7YJNoCvLClLq8EH5lFWXJEJpSmHSvRh-oy9g1kdKvzB8_J172YSPpGqNpu2kharajzeBcaKVD-I-YB6ZPO7tlTEtuQ4DFfuBe-ixjvpPp2aZgFjxZHX9pgJda8lj3hGNofLLFxsSOawAba5UJl9CHrP6z5lPzptWC9prV63nbsXb5pba5aD5uVmCi4He4Tnq9a5Xk9cn68Ceh1lwizj5AqE2I_8ZhLTWlP5FW5AJGxvVYz6_ec1yyl1wwzLYF_v6DltnJpl628JVAw",
"payload": ""
}
2022-04-03 02:02:57,462:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/94342177390 HTTP/1.1" 200 801
2022-04-03 02:02:57,462:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 03 Apr 2022 09:02:57 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 479034450
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 0001vbKyGRFMKr1Wk45-saPD_XFyvS1GN-48-02y8mIMibI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "overseerr.kesutu.net"
},
"status": "pending",
"expires": "2022-04-10T09:02:57Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/94342177390/ZgG1Qg",
"token": "xlsVElrDbWdLZ8117w3T9idGJgiljwf5KlKb4QNRZeQ"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/94342177390/MLQQlg",
"token": "xlsVElrDbWdLZ8117w3T9idGJgiljwf5KlKb4QNRZeQ"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/94342177390/sHy3gQ",
"token": "xlsVElrDbWdLZ8117w3T9idGJgiljwf5KlKb4QNRZeQ"
}
]
}
2022-04-03 02:02:57,462:DEBUG:acme.client:Storing nonce: 0001vbKyGRFMKr1Wk45-saPD_XFyvS1GN-48-02y8mIMibI
2022-04-03 02:02:57,463:INFO:certbot._internal.auth_handler:Performing the following challenges:
2022-04-03 02:02:57,463:INFO:certbot._internal.auth_handler:http-01 challenge for overseerr.kesutu.net
2022-04-03 02:02:57,463:INFO:certbot._internal.plugins.webroot:Using the webroot path /data/letsencrypt-acme-challenge for all unmatched domains.
2022-04-03 02:02:57,463:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /data/letsencrypt-acme-challenge/.well-known/acme-challenge
2022-04-03 02:02:57,465:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /data/letsencrypt-acme-challenge/.well-known/acme-challenge/xlsVElrDbWdLZ8117w3T9idGJgiljwf5KlKb4QNRZeQ
2022-04-03 02:02:57,465:DEBUG:acme.client:JWS payload:
b'{}'
2022-04-03 02:02:57,466:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/94342177390/ZgG1Qg:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNDc5MDM0NDUwIiwgIm5vbmNlIjogIjAwMDF2Ykt5R1JGTUtyMVdrNDUtc2FQRF9YRnl2UzFHTi00OC0wMnk4bUlNaWJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My85NDM0MjE3NzM5MC9aZ0cxUWcifQ",
"signature": "YApRK1TXjuCgh6HV4mVkX2u9cOOFzEQtVvXBkDvVGX9qNxnrKCmTtKyUWpGjFVYi_stX88FdH0dtLwfZEhwJWxP5UdII8wZ5NTv1fnGytpAgXeMHfCN_s7nE5KX-ucfzNNDXAXfiU0TPThG_h-5Ol4OSOI5IkO0hJV2JNZIb0QR4HuFMT5qqnNG8SQAdCz1LEownWY7xGIMaYDSZ-f_lQsL9f7OXP1JVmSOhys3YteedTIzgebZtoIVbzdWL2cIrW-_C6uiLKxZFkXpHtUhTHxdnh5wOkR5yGKaNMNarnPa8_Pq___16rqugrK3_FYNxSWUu5HrI8M0hHwCBWaf0ZA",
"payload": "e30"
}
2022-04-03 02:02:57,676:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/94342177390/ZgG1Qg HTTP/1.1" 200 186
2022-04-03 02:02:57,676:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 03 Apr 2022 09:02:57 GMT
Content-Type: application/json
Content-Length: 186
Connection: keep-alive
Boulder-Requester: 479034450
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index", https://acme-v02.api.letsencrypt.org/acme/authz-v3/94342177390;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/94342177390/ZgG1Qg
Replay-Nonce: 00026pYFQOf1V4Vy9BUnJjFi1-UKrfpRQoevcKW5WiR-6AE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/94342177390/ZgG1Qg",
"token": "xlsVElrDbWdLZ8117w3T9idGJgiljwf5KlKb4QNRZeQ"
}
2022-04-03 02:02:57,676:DEBUG:acme.client:Storing nonce: 00026pYFQOf1V4Vy9BUnJjFi1-UKrfpRQoevcKW5WiR-6AE
2022-04-03 02:02:57,677:INFO:certbot._internal.auth_handler:Waiting for verification...
2022-04-03 02:02:58,678:DEBUG:acme.client:JWS payload:
b''
2022-04-03 02:02:58,679:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/94342177390:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNDc5MDM0NDUwIiwgIm5vbmNlIjogIjAwMDI2cFlGUU9mMVY0Vnk5QlVuSmpGaTEtVUtyZnBSUW9ldmNLVzVXaVItNkFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My85NDM0MjE3NzM5MCJ9",
"signature": "Yxc8zuFS0o_mw1DWBHlYpHL5qBUFXXgRGLSvCG5oaH_dlJSCcs_2PVhW3xUgGSWTKorpBsr3HeBNlQ0ew1a5bzHmHt_XAGqslkAOjQ8lgC98yQfkBCxmcm5kE4gAQlgo5u2IvmUSGv2DMYFSNX_vzcq3Wc2RfrwUddfwkw1oN23M4e6UlsKitmHcwqul4DiI6t-kGit64psNfiqKGeORt5xGKKlbdBF4SQJWkQcMt6dga6883wEZRk2D1TnR8F32P17N_A999bhNWTVuncTT5lC1UrQnIMaUJUWV1yTe8oDUmSgTY_gne0Fq4kOR9uJcIH6n2qCBFKEvbG1yW-mvTg",
"payload": ""
}
2022-04-03 02:02:58,889:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/94342177390 HTTP/1.1" 200 1045
2022-04-03 02:02:58,889:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 03 Apr 2022 09:02:58 GMT
Content-Type: application/json
Content-Length: 1045
Connection: keep-alive
Boulder-Requester: 479034450
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 0001hrYNv6r0F7Gzk_XUubef-bnQQ2_cR5NqK4PbSIubYec
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "overseerr.kesutu.net"
},
"status": "invalid",
"expires": "2022-04-10T09:02:57Z",
"challenges": [
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:unauthorized",
"detail": "Invalid response from http://overseerr.kesutu.net/.well-known/acme-challenge/xlsVElrDbWdLZ8117w3T9idGJgiljwf5KlKb4QNRZeQ [202.65.69.50]: 404",
"status": 403
},
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/94342177390/ZgG1Qg",
"token": "xlsVElrDbWdLZ8117w3T9idGJgiljwf5KlKb4QNRZeQ",
"validationRecord": [
{
"url": "http://overseerr.kesutu.net/.well-known/acme-challenge/xlsVElrDbWdLZ8117w3T9idGJgiljwf5KlKb4QNRZeQ",
"hostname": "overseerr.kesutu.net",
"port": "80",
"addressesResolved": [
"202.65.69.50"
],
"addressUsed": "202.65.69.50"
}
],
"validated": "2022-04-03T09:02:57Z"
}
]
}
2022-04-03 02:02:58,889:DEBUG:acme.client:Storing nonce: 0001hrYNv6r0F7Gzk_XUubef-bnQQ2_cR5NqK4PbSIubYec
2022-04-03 02:02:58,890:INFO:certbot._internal.auth_handler:Challenge failed for domain overseerr.kesutu.net
2022-04-03 02:02:58,890:INFO:certbot._internal.auth_handler:http-01 challenge for overseerr.kesutu.net
2022-04-03 02:02:58,890:DEBUG:certbot._internal.display.obj:Notifying user:
Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
Domain: overseerr.kesutu.net
Type: unauthorized
Detail: Invalid response from http://overseerr.kesutu.net/.well-known/acme-challenge/xlsVElrDbWdLZ8117w3T9idGJgiljwf5KlKb4QNRZeQ [202.65.69.50]: 404
Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.
2022-04-03 02:02:58,951:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/auth_handler.py", line 106, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/auth_handler.py", line 206, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2022-04-03 02:02:58,951:DEBUG:certbot._internal.error_handler:Calling registered functions
2022-04-03 02:02:58,951:INFO:certbot._internal.auth_handler:Cleaning up challenges
2022-04-03 02:02:58,951:DEBUG:certbot._internal.plugins.webroot:Removing /data/letsencrypt-acme-challenge/.well-known/acme-challenge/xlsVElrDbWdLZ8117w3T9idGJgiljwf5KlKb4QNRZeQ
2022-04-03 02:02:58,952:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up
2022-04-03 02:02:58,952:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 8, in
sys.exit(main())
File "/opt/certbot/lib/python3.7/site-packages/certbot/main.py", line 19, in main
return internal_main.main(cli_args)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/main.py", line 1715, in main
return config.func(config, plugins)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/main.py", line 1574, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/main.py", line 139, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/client.py", line 513, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/client.py", line 441, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/client.py", line 493, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/auth_handler.py", line 106, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File "/opt/certbot/lib/python3.7/site-packages/certbot/_internal/auth_handler.py", line 206, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2022-04-03 02:02:58,953:ERROR:certbot._internal.log:Some challenges have failed.
My web server is (include version):
The operating system my web server runs on is (include version): Unraid OS 6.9.2
My hosting provider, if applicable, is: N/A
I can login to a root shell on my machine (yes or no, or I don't know): Yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot): 1.25.0