The Certificate Authority failed to verify the temporary nginx configuration changes made by Certbot

My domain is:
kuzmani.vps.webdock.cloud

I ran this command:
sudo certbot --nginx

It produced this output:

Hint: The Certificate Authority failed to verify the temporary nginx configuration changes made by Certbot. Ensure the listed domains point to this nginx server and that it is accessible from the internet.

Some challenges have failed.

My web server is (include version):

nginx version: nginx/1.24.0 (Ubuntu)

The operating system my web server runs on is (include version):

Ubuntu 24.04

My hosting provider, if applicable, is:

webdock.io

I can login to a root shell on my machine (yes or no, or I don't know):

yes

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):

no

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):

certbot 3.2.0

2025-02-19 15:02:52,501:DEBUG:urllib3.connectionpool:http://localhost:None "GET /v2/connections?snap=certbot&interface=content HTTP/1.1" 200 97
2025-02-19 15:02:52,970:DEBUG:certbot._internal.main:certbot version: 3.2.0
2025-02-19 15:02:52,970:DEBUG:certbot._internal.main:Location of certbot entry point: /snap/certbot/4412/bin/certbot
2025-02-19 15:02:52,970:DEBUG:certbot._internal.main:Arguments: ['--nginx', '--preconfigured-renewal']
2025-02-19 15:02:52,971:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2025-02-19 15:02:52,999:DEBUG:certbot._internal.log:Root logging level set at 30
2025-02-19 15:02:53,000:DEBUG:certbot._internal.plugins.selection:Requested authenticator nginx and installer nginx
2025-02-19 15:02:53,131:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * nginx
Description: Nginx Web Server plugin
Interfaces: Authenticator, Installer, Plugin
Entry point: EntryPoint(name='nginx', value='certbot_nginx._internal.configurator:NginxConfigurator', group='certbot.plugins')
Initialized: <certbot_nginx._internal.configurator.NginxConfigurator object at 0x78d8367dd6a0>
Prep: True
2025-02-19 15:02:53,132:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot_nginx._internal.configurator.NginxConfigurator object at 0x78d8367dd6a0> and installer <certbot_nginx._internal.configurator.NginxConfigurator object at 0x78d8367dd6a0>
2025-02-19 15:02:53,132:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator nginx, Installer nginx
2025-02-19 15:03:04,033:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-02-19 15:03:04,035:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-02-19 15:03:04,445:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-02-19 15:03:04,446:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 19 Feb 2025 15:03:04 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "_TakUE-eKwM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "The same profile you're accustomed to"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-02-19 15:03:10,300:DEBUG:acme.client:Requesting fresh nonce
2025-02-19 15:03:10,301:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-02-19 15:03:10,436:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-02-19 15:03:10,437:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 19 Feb 2025 15:03:10 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: XJ_wRSzVjX2j_DAX6RYZws9n5tpOdqpr_jfD3ErdXMGteVmScwA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2025-02-19 15:03:10,437:DEBUG:acme.client:Storing nonce: XJ_wRSzVjX2j_DAX6RYZws9n5tpOdqpr_jfD3ErdXMGteVmScwA
2025-02-19 15:03:10,437:DEBUG:acme.client:JWS payload:
b'{\n  "contact": [\n    "mailto:otonosan@gmail.com"\n  ],\n  "termsOfServiceAgreed": true\n}'
2025-02-19 15:03:10,441:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-acct:
{
  "protected": "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",
  "signature": "Qz5Go2cRfDjgcriinvy70i5TFcI0apwTR1-pK9sBVZuPRH6qlWgHfOCkZlJgpkjBFMSmpGgysrvZwAkP1L-c228TLx4AbOn0xnBXdYFcVGqIooMyk28yqQGlqL58JmERA0z48xCaT6T8TVEBXbjZvQmFzCWwyEJ_citKqRWVh5xMvLW67nGE2YRV0xYspxE0-18WjHzEl5Pnqx-6KbftRHdjOxe7ygW5B15_EyPi4EpWtEZzS1U4Ot9JWW8zARTfVL2k2taaF9spsXvz67kJh8vj9HFIkqGRFFE_hgFS82qnd3aC7XXzYWXzC3no2KkoYJfSofsRQQIQtlgTUHpocg",
  "payload": "ewogICJjb250YWN0IjogWwogICAgIm1haWx0bzpvdG9ub3NhbkBnbWFpbC5jb20iCiAgXSwKICAidGVybXNPZlNlcnZpY2VBZ3JlZWQiOiB0cnVlCn0"
}
2025-02-19 15:03:10,612:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-acct HTTP/1.1" 201 529
2025-02-19 15:03:10,613:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 19 Feb 2025 15:03:10 GMT
Content-Type: application/json
Content-Length: 529
Connection: keep-alive
Boulder-Requester: 2238211055
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf>;rel="terms-of-service"
Location: https://acme-v02.api.letsencrypt.org/acme/acct/2238211055
Replay-Nonce: Suu3UAJcpcTQAlTapsJ0KnwcDxMPmKaY-SSaueYo4F9Xn9U2ENw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "key": {
    "kty": "RSA",
    "n": "kQhR_x9gcHQAUCp3_CrLdrrozIl03EA77QiHlmkLfEg4_TFvwc_aaVarrIk3HYnYAV_zTldNPW9fmg7Terps8v-5dMEmvJBVN65475NYEPKrKstcl5g3g14buShQQG2xMYN2We8s4pqSKf301AMmDpZTFWWwBPJzMxvLLX4o4l-DX7f5Cliafv4U5KseXB2hHv_csmm7d_0H5fL3aRG0Tf1XPFqelRulGIHIc1C7l8DX-HNlrXdJcvfm1IbIS6g09ybbU8ZtVx7Vl2qgorm71YYEUBuG12bdwjtQW0niVnOG1-c19T29cRjRXVQE-m3xsdDt-7zb8oA0IXarFdrd-Q",
    "e": "AQAB"
  },
  "contact": [
    "mailto:otonosan@gmail.com"
  ],
  "createdAt": "2025-02-19T15:03:10.543717571Z",
  "status": "valid"
}
2025-02-19 15:03:10,614:DEBUG:acme.client:Storing nonce: Suu3UAJcpcTQAlTapsJ0KnwcDxMPmKaY-SSaueYo4F9Xn9U2ENw
2025-02-19 15:03:18,930:DEBUG:certbot._internal.display.obj:Notifying user: Account registered.
2025-02-19 15:03:18,931:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=JWKRSA(key=<ComparableRSAKey(<cryptography.hazmat.bindings._rust.openssl.rsa.RSAPublicKey object at 0x78d833e2c490>)>), contact=('mailto:otonosan@gmail.com',), agreement=None, status='valid', terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/2238211055', new_authzr_uri=None, terms_of_service='https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf'), da1b81b0a1ba7901f58548bbbc2de5be, Meta(creation_dt=datetime.datetime(2025, 2, 19, 15, 3, 10, tzinfo=<UTC>), creation_host='kuzmani', register_to_eff='otonosan@gmail.com'))>
2025-02-19 15:03:18,939:DEBUG:certbot.util:Not suggesting name "_"
Traceback (most recent call last):
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/util.py", line 389, in get_filtered_names
    filtered_names.add(enforce_le_validity(name))
                       ^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/util.py", line 579, in enforce_le_validity
    raise errors.ConfigurationError(
certbot.errors.ConfigurationError: _ contains an invalid character. Valid characters are A-Z, a-z, 0-9, ., and -.
2025-02-19 15:03:28,955:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for kuzmani.vps.webdock.cloud
2025-02-19 15:03:28,985:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "kuzmani.vps.webdock.cloud"\n    }\n  ]\n}'
2025-02-19 15:03:28,987:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMjIzODIxMTA1NSIsICJub25jZSI6ICJTdXUzVUFKY3BjVFFBbFRhcHNKMEtud2NEeE1QbUthWS1TU2F1ZVlvNEY5WG45VTJFTnciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9",
  "signature": "V5zVWjyCdFcuKlAp0ACrMHilJfJCkaO-w3Z3h_Jln2uVoVuW36ZkeBd6_C_WFWFYao2NaICdVVe5dK-ljMwuNMeRvGq54cDg8F_BWz7i3cllKvZRnPWTR0Jx6WQpPlIMVHO2Xn_o4QUDPyG9kElAfZdaVBSRgQgjwHPsYBJtCN3uZtXiFqeeub4HKH5-Rux0aIntmA5pL4xllr8SzBotKD7VoKcI_p3zqVUti2Pv4Lzlcs7aSMiqutpPY9Z0o0XgtNsQifx6nrZYsXdeEe-yIWPQayQXzqaZNQaD5h2txUHVUMlW5V1qC6erlHs-xOSnt-ozSmPSgMWvAcOlbP6lJg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImt1em1hbmkudnBzLndlYmRvY2suY2xvdWQiCiAgICB9CiAgXQp9"
}
2025-02-19 15:03:29,171:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 359
2025-02-19 15:03:29,172:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 19 Feb 2025 15:03:29 GMT
Content-Type: application/json
Content-Length: 359
Connection: keep-alive
Boulder-Requester: 2238211055
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/2238211055/355999106575
Replay-Nonce: Suu3UAJcNyanDNcu5hpEjlLDgWh4561MzOFuYO_Cfq4nfEW-sq4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2025-02-26T15:03:29Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "kuzmani.vps.webdock.cloud"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/2238211055/478395038745"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/2238211055/355999106575"
}
2025-02-19 15:03:29,172:DEBUG:acme.client:Storing nonce: Suu3UAJcNyanDNcu5hpEjlLDgWh4561MzOFuYO_Cfq4nfEW-sq4
2025-02-19 15:03:29,174:DEBUG:acme.client:JWS payload:
b''
2025-02-19 15:03:29,176:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/2238211055/478395038745:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMjIzODIxMTA1NSIsICJub25jZSI6ICJTdXUzVUFKY055YW5ETmN1NWhwRWpsTERnV2g0NTYxTXpPRnVZT19DZnE0bmZFVy1zcTQiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LzIyMzgyMTEwNTUvNDc4Mzk1MDM4NzQ1In0",
  "signature": "j6VtbbNi7BGE9S6QsLJwSzubXU2s4ggEwN_ZN3CgUAfCqmo9FB0vQRtM32yLfxoA_6qkq10A0PmkHeWaIM4Rq5cAU8QCg3krgdtCFm4FdSBNWZF3HnON7FmToTutXSaPbswdnonZw2T0zq1RU12ps5TwiT5kO-tkiwHCPJCiZw3KPJwlNDyf9MZpEMlQBfd0qUUg8cNbztqb6T9TzCMn4pRRuowmYj7Z9rLrl_ejwXiEHE6Xyl1TFvHot1ifoS68mSxXABRasgeHx1xOBrHESvwVejCKsYv7M-FudwlDpaR0j-_dh_QjRQwW162WF4mIj_AoEKkNXLyMfGREti_xwQ",
  "payload": ""
}
2025-02-19 15:03:29,315:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/2238211055/478395038745 HTTP/1.1" 200 833
2025-02-19 15:03:29,316:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 19 Feb 2025 15:03:29 GMT
Content-Type: application/json
Content-Length: 833
Connection: keep-alive
Boulder-Requester: 2238211055
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Suu3UAJc8iq37vXpmnfho_O_2nEKRCzAK65Ahmnt_kFjOz6Q4Xk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "kuzmani.vps.webdock.cloud"
  },
  "status": "pending",
  "expires": "2025-02-26T15:03:29Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/2238211055/478395038745/uDSENA",
      "status": "pending",
      "token": "WHzp6w8CpGn-8FjwriumrGEWW80gqken7tesSRGRtSw"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/2238211055/478395038745/t6wf3w",
      "status": "pending",
      "token": "WHzp6w8CpGn-8FjwriumrGEWW80gqken7tesSRGRtSw"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/2238211055/478395038745/a536-Q",
      "status": "pending",
      "token": "WHzp6w8CpGn-8FjwriumrGEWW80gqken7tesSRGRtSw"
    }
  ]
}
2025-02-19 15:03:29,316:DEBUG:acme.client:Storing nonce: Suu3UAJc8iq37vXpmnfho_O_2nEKRCzAK65Ahmnt_kFjOz6Q4Xk
2025-02-19 15:03:29,318:INFO:certbot._internal.auth_handler:Performing the following challenges:
2025-02-19 15:03:29,318:INFO:certbot._internal.auth_handler:http-01 challenge for kuzmani.vps.webdock.cloud
2025-02-19 15:03:29,332:DEBUG:certbot_nginx._internal.http_01:Generated server block:
[]
2025-02-19 15:03:29,333:DEBUG:certbot.reverter:Creating backup of /etc/nginx/mime.types
2025-02-19 15:03:29,333:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/default
2025-02-19 15:03:29,333:DEBUG:certbot.reverter:Creating backup of /etc/nginx/nginx.conf
2025-02-19 15:03:29,334:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/post_tracker
2025-02-19 15:03:29,334:DEBUG:certbot_nginx._internal.parser:Writing nginx conf tree to /etc/nginx/nginx.conf:
user www-data;
worker_processes auto;
pid /run/nginx.pid;
error_log /var/log/nginx/error.log;
include /etc/nginx/modules-enabled/*.conf;

events {
	worker_connections 768;
	# multi_accept on;
}

http {
server_names_hash_bucket_size 128;
include /etc/letsencrypt/le_http_01_cert_challenge.conf;

	##
	# Basic Settings
	##

	sendfile on;
	tcp_nopush on;
	types_hash_max_size 2048;
	# server_tokens off;

	# server_names_hash_bucket_size 64;
	# server_name_in_redirect off;

	include /etc/nginx/mime.types;
	default_type application/octet-stream;

	##
	# SSL Settings
	##

	ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3; # Dropping SSLv3, ref: POODLE
	ssl_prefer_server_ciphers on;

	##
	# Logging Settings
	##

	access_log /var/log/nginx/access.log;

	##
	# Gzip Settings
	##

	gzip on;

	# gzip_vary on;
	# gzip_proxied any;
	# gzip_comp_level 6;
	# gzip_buffers 16 8k;
	# gzip_http_version 1.1;
	# gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript;

	##
	# Virtual Host Configs
	##

	include /etc/nginx/conf.d/*.conf;
	include /etc/nginx/sites-enabled/*;
}


#mail {
#	# See sample authentication script at:
#	# http://wiki.nginx.org/ImapAuthenticateWithApachePhpScript
#
#	# auth_http localhost/auth.php;
#	# pop3_capabilities "TOP" "USER";
#	# imap_capabilities "IMAP4rev1" "UIDPLUS";
#
#	server {
#		listen     localhost:110;
#		protocol   pop3;
#		proxy      on;
#	}
#
#	server {
#		listen     localhost:143;
#		protocol   imap;
#		proxy      on;
#	}
#}

2025-02-19 15:03:29,335:DEBUG:certbot_nginx._internal.parser:Writing nginx conf tree to /etc/nginx/sites-enabled/post_tracker:
server {rewrite ^(/.well-known/acme-challenge/.*) $1 break; # managed by Certbot


    server_name kuzmani.vps.webdock.cloud;

    location / {
        proxy_pass http://localhost:9091;
    }
location = /.well-known/acme-challenge/WHzp6w8CpGn-8FjwriumrGEWW80gqken7tesSRGRtSw{default_type text/plain;return 200 WHzp6w8CpGn-8FjwriumrGEWW80gqken7tesSRGRtSw.iU4yLKrABWNGD_mtekmp3ccuzMAM729DzbjcYAQSa3Y;} # managed by Certbot

}

2025-02-19 15:03:30,346:DEBUG:acme.client:JWS payload:
b'{}'
2025-02-19 15:03:30,348:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall/2238211055/478395038745/t6wf3w:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMjIzODIxMTA1NSIsICJub25jZSI6ICJTdXUzVUFKYzhpcTM3dlhwbW5maG9fT18ybkVLUkN6QUs2NUFobW50X2tGak96NlE0WGsiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLzIyMzgyMTEwNTUvNDc4Mzk1MDM4NzQ1L3Q2d2YzdyJ9",
  "signature": "CuurFpkER_2XsSZ05sKFKryi9ec-Tkikz5nRhJMeaMoFUpO_TQJuS9ixnILqXLwWKxQBGgVcreI2l5f2xN4L7eAdjvRVOe5n3U0vdyI6M7NH-r5rPTMNAH7NRz-kwHDvgdAezuBZSyshbzZxMTO7I9M2Ezk2VwGH14EJi7CSf1tnEFJoObo9yFiY38n9AzrgTqatK-eApdnm0K7ez77Dlxd-GXhvjOaidsgZdfbZpWT7d3oefLdTEgQbZhD2EpiyCS4qLREX67ZV7nO3m1oxeSN5e6Da3tMu9naMQn_-4Dm14klgYG7x8Pj_JeXez0eHUhmSrQEACzfTxlyEklW2xw",
  "payload": "e30"
}
2025-02-19 15:03:30,487:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall/2238211055/478395038745/t6wf3w HTTP/1.1" 200 195
2025-02-19 15:03:30,487:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 19 Feb 2025 15:03:30 GMT
Content-Type: application/json
Content-Length: 195
Connection: keep-alive
Boulder-Requester: 2238211055
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz/2238211055/478395038745>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall/2238211055/478395038745/t6wf3w
Replay-Nonce: XJ_wRSzVMU0mjQ57eYGBZeYQ_V_b8XJA8zfSah4_dalpB-torv8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "type": "http-01",
  "url": "https://acme-v02.api.letsencrypt.org/acme/chall/2238211055/478395038745/t6wf3w",
  "status": "pending",
  "token": "WHzp6w8CpGn-8FjwriumrGEWW80gqken7tesSRGRtSw"
}
2025-02-19 15:03:30,487:DEBUG:acme.client:Storing nonce: XJ_wRSzVMU0mjQ57eYGBZeYQ_V_b8XJA8zfSah4_dalpB-torv8
2025-02-19 15:03:30,487:INFO:certbot._internal.auth_handler:Waiting for verification...
2025-02-19 15:03:31,488:DEBUG:acme.client:JWS payload:
b''
2025-02-19 15:03:31,491:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/2238211055/478395038745:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMjIzODIxMTA1NSIsICJub25jZSI6ICJYSl93UlN6Vk1VMG1qUTU3ZVlHQlplWVFfVl9iOFhKQTh6ZlNhaDRfZGFscEItdG9ydjgiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LzIyMzgyMTEwNTUvNDc4Mzk1MDM4NzQ1In0",
  "signature": "XeI-vrN7gU1dvrwkiB-sUrz7S-Nb9cfOW0zegp4-i5GuG5hFEtHCi6-wkl-Hrtfb0s7H0Z7yzCAROj-KKqG5GSj45aYhiAtdvEsQdO9kId2vc0Lt6fhjsg6aVryoJotJ4JuuU3x-fCyIEUiKSZ9ehi5Aewr7BKZoRpiKv3ZuBbzy1wcjVYGpQY1CNA5dqKfCyOmsCs0-C4r6Xv7T-Pbmzt547g1R3SDKgjjfY2y7vTVnIpA-lrHFbRlGPia5bzJlBt_tC_L6tRULkUylivtX4LMK4si1v9TuXcvCCzq6fk_u0PxMOJuILS-NUeRslp0f6CcPNZPDxwsk36uNybwoRw",
  "payload": ""
}
2025-02-19 15:03:31,641:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/2238211055/478395038745 HTTP/1.1" 200 1117
2025-02-19 15:03:31,642:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 19 Feb 2025 15:03:31 GMT
Content-Type: application/json
Content-Length: 1117
Connection: keep-alive
Boulder-Requester: 2238211055
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Suu3UAJc-g59O_R33VPHD_4QBEHQokKxVX4XSWevFueXzNMFNP8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "kuzmani.vps.webdock.cloud"
  },
  "status": "invalid",
  "expires": "2025-02-26T15:03:29Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/2238211055/478395038745/t6wf3w",
      "status": "invalid",
      "validated": "2025-02-19T15:03:30Z",
      "error": {
        "type": "urn:ietf:params:acme:error:unauthorized",
        "detail": "2a0f:f01:202:30::: Invalid response from http://kuzmani.vps.webdock.cloud/.well-known/acme-challenge/WHzp6w8CpGn-8FjwriumrGEWW80gqken7tesSRGRtSw: 404",
        "status": 403
      },
      "token": "WHzp6w8CpGn-8FjwriumrGEWW80gqken7tesSRGRtSw",
      "validationRecord": [
        {
          "url": "http://kuzmani.vps.webdock.cloud/.well-known/acme-challenge/WHzp6w8CpGn-8FjwriumrGEWW80gqken7tesSRGRtSw",
          "hostname": "kuzmani.vps.webdock.cloud",
          "port": "80",
          "addressesResolved": [
            "45.136.70.215",
            "2a0f:f01:202:30::"
          ],
          "addressUsed": "2a0f:f01:202:30::"
        }
      ]
    }
  ]
}
2025-02-19 15:03:31,643:DEBUG:acme.client:Storing nonce: Suu3UAJc-g59O_R33VPHD_4QBEHQokKxVX4XSWevFueXzNMFNP8
2025-02-19 15:03:31,644:INFO:certbot._internal.auth_handler:Challenge failed for domain kuzmani.vps.webdock.cloud
2025-02-19 15:03:31,645:INFO:certbot._internal.auth_handler:http-01 challenge for kuzmani.vps.webdock.cloud
2025-02-19 15:03:31,645:DEBUG:certbot._internal.display.obj:Notifying user: 
Certbot failed to authenticate some domains (authenticator: nginx). The Certificate Authority reported these problems:
  Domain: kuzmani.vps.webdock.cloud
  Type:   unauthorized
  Detail: 2a0f:f01:202:30::: Invalid response from http://kuzmani.vps.webdock.cloud/.well-known/acme-challenge/WHzp6w8CpGn-8FjwriumrGEWW80gqken7tesSRGRtSw: 404

Hint: The Certificate Authority failed to verify the temporary nginx configuration changes made by Certbot. Ensure the listed domains point to this nginx server and that it is accessible from the internet.

2025-02-19 15:03:31,651:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/_internal/auth_handler.py", line 108, in handle_authorizations
    self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations
    raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

2025-02-19 15:03:31,651:DEBUG:certbot._internal.error_handler:Calling registered functions
2025-02-19 15:03:31,652:INFO:certbot._internal.auth_handler:Cleaning up challenges
2025-02-19 15:03:32,751:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "/snap/certbot/4412/bin/certbot", line 8, in <module>
    sys.exit(main())
             ^^^^^^
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/main.py", line 19, in main
    return internal_main.main(cli_args)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/_internal/main.py", line 1871, in main
    return config.func(config, plugins)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/_internal/main.py", line 1427, in run
    new_lineage = _get_and_save_cert(le_client, config, domains,
                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/_internal/main.py", line 142, in _get_and_save_cert
    lineage = le_client.obtain_and_enroll_certificate(domains, certname)
              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/_internal/client.py", line 519, in obtain_and_enroll_certificate
    cert, chain, key, _ = self.obtain_certificate(domains)
                          ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/_internal/client.py", line 429, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/_internal/client.py", line 498, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/_internal/auth_handler.py", line 108, in handle_authorizations
    self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
  File "/snap/certbot/4412/lib/python3.12/site-packages/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations
    raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2025-02-19 15:03:32,760:ERROR:certbot._internal.log:Some challenges have failed.

Problem is solved, just forgot to add

    listen 80;
    listen [::]:80;
2 Likes

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.