Timeout during connect (likely firewall problem)

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is: test123domain.xyz

I ran this command: sudo certbot certonly --apache -v

It produced this output:

Saving debug log to /var/log/letsencrypt/letsencrypt.log

ssl_module is statically linked but --apache-bin is missing; not disabling session tickets.

Plugins selected: Authenticator apache, Installer apache

Which names would you like to activate HTTPS for?

We recommend selecting either all domains, or all domains in a VirtualHost/server block.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

1: test123domain.xyz

2: www.test123domain.xyz

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Select the appropriate numbers separated by commas and/or spaces, or leave input

blank to select all options shown (Enter 'c' to cancel): 1

Requesting a certificate for test123domain.xyz

Performing the following challenges:

http-01 challenge for test123domain.xyz

Waiting for verification...

Challenge failed for domain test123domain.xyz

http-01 challenge for test123domain.xyz

Certbot failed to authenticate some domains (authenticator: apache). The Certificate Authority reported these problems:

Domain: test123domain.xyz

Type: connection

Detail: 104.171.54.23: Fetching http://test123domain.xyz/.well-known/acme-challenge/A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38: Timeout during connect (likely firewall problem)

Hint: The Certificate Authority failed to verify the temporary Apache configuration changes made by Certbot. Ensure that the listed domains point to this Apache server and that it is accessible from the internet.

Cleaning up challenges

Some challenges have failed.

Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details.

My web server is (include version): Apache/2.4.58 (Unix) OpenSSL/3.2.1

The operating system my web server runs on is (include version): MacOS 14.1.2

My hosting provider, if applicable, is: self hosting

I can login to a root shell on my machine (yes or no, or I don't know): yes

I'm using a control panel to manage my site (no, or provide the name and version of the control panel): no

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot): certbot 2.9.0

Apache is default install via brew, httpd.conf is lightly changed:

#
# This is the main Apache HTTP server configuration file.  It contains the
# configuration directives that give the server its instructions.
# See <URL:http://httpd.apache.org/docs/2.4/> for detailed information.
# In particular, see 
# <URL:http://httpd.apache.org/docs/2.4/mod/directives.html>
# for a discussion of each configuration directive.
#
# Do NOT simply read the instructions in here without understanding
# what they do.  They're here only as hints or reminders.  If you are unsure
# consult the online docs. You have been warned.  
#
# Configuration and logfile names: If the filenames you specify for many
# of the server's control files begin with "/" (or "drive:/" for Win32), the
# server will use that explicit path.  If the filenames do *not* begin
# with "/", the value of ServerRoot is prepended -- so "logs/access_log"
# with ServerRoot set to "/usr/local/apache2" will be interpreted by the
# server as "/usr/local/apache2/logs/access_log", whereas "/logs/access_log" 
# will be interpreted as '/logs/access_log'.

#
# ServerRoot: The top of the directory tree under which the server's
# configuration, error, and log files are kept.
#
# Do not add a slash at the end of the directory path.  If you point
# ServerRoot at a non-local disk, be sure to specify a local disk on the
# Mutex directive, if file-based mutexes are used.  If you wish to share the
# same ServerRoot for multiple httpd daemons, you will need to change at
# least PidFile.
#
ServerRoot "/usr/local/homebrew/opt/httpd"

#
# Mutex: Allows you to set the mutex mechanism and mutex file directory
# for individual mutexes, or change the global defaults
#
# Uncomment and change the directory if mutexes are file-based and the default
# mutex file directory is not on a local disk or is not appropriate for some
# other reason.
#
# Mutex default:/usr/local/homebrew/var/run/httpd

#
# Listen: Allows you to bind Apache to specific IP addresses and/or
# ports, instead of the default. See also the <VirtualHost>
# directive.
#
# Change this to Listen on specific IP addresses as shown below to 
# prevent Apache from glomming onto all bound IP addresses.
#
#Listen 12.34.56.78:80
Listen 80
<VirtualHost *:80>
    ServerName test123domain.xyz
    ServerAlias www.test123domain.xyz
    DocumentRoot /usr/local/homebrew/var/www 

    ErrorLog /var/log/apache2/error.log
    CustomLog /var/log/apache2/access.log combined
</VirtualHost>

Listen 443 https
<VirtualHost *:443>
    ServerAlias www.test123domain.xyz
    DocumentRoot /usr/local/homebrew/var/www 
    ServerName test123domain.xyz
        SSLEngine on
        SSLCertificateFile /Users/admin/Documents/cert.crt
        SSLCertificateKeyFile /Users/admin/Documents/private.key
    ErrorLog /var/log/apache2/ssl-error.log
    CustomLog /var/log/apache2/ssl-access.log combined
</VirtualHost>
#
# Dynamic Shared Object (DSO) Support
#
# To be able to use the functionality of a module which was built as a DSO you
# have to place corresponding `LoadModule' lines at this location so the
# directives contained in it are actually available _before_ they are used.
# Statically compiled modules (those listed by `httpd -l') do not need
# to be loaded here.
#
# Example:
# LoadModule foo_module modules/mod_foo.so
#
#LoadModule mpm_event_module lib/httpd/modules/mod_mpm_event.so
LoadModule mpm_prefork_module lib/httpd/modules/mod_mpm_prefork.so
#LoadModule mpm_worker_module lib/httpd/modules/mod_mpm_worker.so
LoadModule authn_file_module lib/httpd/modules/mod_authn_file.so
#LoadModule authn_dbm_module lib/httpd/modules/mod_authn_dbm.so
#LoadModule authn_anon_module lib/httpd/modules/mod_authn_anon.so
#LoadModule authn_dbd_module lib/httpd/modules/mod_authn_dbd.so
#LoadModule authn_socache_module lib/httpd/modules/mod_authn_socache.so
LoadModule authn_core_module lib/httpd/modules/mod_authn_core.so
LoadModule authz_host_module lib/httpd/modules/mod_authz_host.so
LoadModule authz_groupfile_module lib/httpd/modules/mod_authz_groupfile.so
LoadModule authz_user_module lib/httpd/modules/mod_authz_user.so
#LoadModule authz_dbm_module lib/httpd/modules/mod_authz_dbm.so
#LoadModule authz_owner_module lib/httpd/modules/mod_authz_owner.so
#LoadModule authz_dbd_module lib/httpd/modules/mod_authz_dbd.so
LoadModule authz_core_module lib/httpd/modules/mod_authz_core.so
#LoadModule authnz_fcgi_module lib/httpd/modules/mod_authnz_fcgi.so
LoadModule access_compat_module lib/httpd/modules/mod_access_compat.so
LoadModule auth_basic_module lib/httpd/modules/mod_auth_basic.so
#LoadModule auth_form_module lib/httpd/modules/mod_auth_form.so
#LoadModule auth_digest_module lib/httpd/modules/mod_auth_digest.so
#LoadModule allowmethods_module lib/httpd/modules/mod_allowmethods.so
#LoadModule file_cache_module lib/httpd/modules/mod_file_cache.so
#LoadModule cache_module lib/httpd/modules/mod_cache.so
#LoadModule cache_disk_module lib/httpd/modules/mod_cache_disk.so
#LoadModule cache_socache_module lib/httpd/modules/mod_cache_socache.so
#LoadModule socache_shmcb_module lib/httpd/modules/mod_socache_shmcb.so
#LoadModule socache_dbm_module lib/httpd/modules/mod_socache_dbm.so
#LoadModule socache_memcache_module lib/httpd/modules/mod_socache_memcache.so
#LoadModule socache_redis_module lib/httpd/modules/mod_socache_redis.so
#LoadModule watchdog_module lib/httpd/modules/mod_watchdog.so
#LoadModule macro_module lib/httpd/modules/mod_macro.so
#LoadModule dbd_module lib/httpd/modules/mod_dbd.so
#LoadModule dumpio_module lib/httpd/modules/mod_dumpio.so
#LoadModule echo_module lib/httpd/modules/mod_echo.so
#LoadModule buffer_module lib/httpd/modules/mod_buffer.so
#LoadModule data_module lib/httpd/modules/mod_data.so
#LoadModule ratelimit_module lib/httpd/modules/mod_ratelimit.so
LoadModule reqtimeout_module lib/httpd/modules/mod_reqtimeout.so
#LoadModule ext_filter_module lib/httpd/modules/mod_ext_filter.so
#LoadModule request_module lib/httpd/modules/mod_request.so
#LoadModule include_module lib/httpd/modules/mod_include.so
LoadModule filter_module lib/httpd/modules/mod_filter.so
#LoadModule reflector_module lib/httpd/modules/mod_reflector.so
#LoadModule substitute_module lib/httpd/modules/mod_substitute.so
#LoadModule sed_module lib/httpd/modules/mod_sed.so
#LoadModule charset_lite_module lib/httpd/modules/mod_charset_lite.so
#LoadModule deflate_module lib/httpd/modules/mod_deflate.so
#LoadModule xml2enc_module lib/httpd/modules/mod_xml2enc.so
#LoadModule proxy_html_module lib/httpd/modules/mod_proxy_html.so
#LoadModule brotli_module lib/httpd/modules/mod_brotli.so
LoadModule mime_module lib/httpd/modules/mod_mime.so
LoadModule log_config_module lib/httpd/modules/mod_log_config.so
#LoadModule log_debug_module lib/httpd/modules/mod_log_debug.so
#LoadModule log_forensic_module lib/httpd/modules/mod_log_forensic.so
#LoadModule logio_module lib/httpd/modules/mod_logio.so
LoadModule env_module lib/httpd/modules/mod_env.so
#LoadModule mime_magic_module lib/httpd/modules/mod_mime_magic.so
#LoadModule expires_module lib/httpd/modules/mod_expires.so
LoadModule headers_module lib/httpd/modules/mod_headers.so
#LoadModule usertrack_module lib/httpd/modules/mod_usertrack.so
#LoadModule unique_id_module lib/httpd/modules/mod_unique_id.so
LoadModule setenvif_module lib/httpd/modules/mod_setenvif.so
LoadModule version_module lib/httpd/modules/mod_version.so
#LoadModule remoteip_module lib/httpd/modules/mod_remoteip.so
#LoadModule proxy_module lib/httpd/modules/mod_proxy.so
#LoadModule proxy_connect_module lib/httpd/modules/mod_proxy_connect.so
#LoadModule proxy_ftp_module lib/httpd/modules/mod_proxy_ftp.so
#LoadModule proxy_http_module lib/httpd/modules/mod_proxy_http.so
#LoadModule proxy_fcgi_module lib/httpd/modules/mod_proxy_fcgi.so
#LoadModule proxy_scgi_module lib/httpd/modules/mod_proxy_scgi.so
#LoadModule proxy_uwsgi_module lib/httpd/modules/mod_proxy_uwsgi.so
#LoadModule proxy_fdpass_module lib/httpd/modules/mod_proxy_fdpass.so
#LoadModule proxy_wstunnel_module lib/httpd/modules/mod_proxy_wstunnel.so
#LoadModule proxy_ajp_module lib/httpd/modules/mod_proxy_ajp.so
#LoadModule proxy_balancer_module lib/httpd/modules/mod_proxy_balancer.so
#LoadModule proxy_express_module lib/httpd/modules/mod_proxy_express.so
#LoadModule proxy_hcheck_module lib/httpd/modules/mod_proxy_hcheck.so
#LoadModule session_module lib/httpd/modules/mod_session.so
#LoadModule session_cookie_module lib/httpd/modules/mod_session_cookie.so
#LoadModule session_crypto_module lib/httpd/modules/mod_session_crypto.so
#LoadModule session_dbd_module lib/httpd/modules/mod_session_dbd.so
#LoadModule slotmem_shm_module lib/httpd/modules/mod_slotmem_shm.so
#LoadModule slotmem_plain_module lib/httpd/modules/mod_slotmem_plain.so
LoadModule ssl_module lib/httpd/modules/mod_ssl.so
#LoadModule dialup_module lib/httpd/modules/mod_dialup.so
#LoadModule http2_module lib/httpd/modules/mod_http2.so
#LoadModule lbmethod_byrequests_module lib/httpd/modules/mod_lbmethod_byrequests.so
#LoadModule lbmethod_bytraffic_module lib/httpd/modules/mod_lbmethod_bytraffic.so
#LoadModule lbmethod_bybusyness_module lib/httpd/modules/mod_lbmethod_bybusyness.so
#LoadModule lbmethod_heartbeat_module lib/httpd/modules/mod_lbmethod_heartbeat.so
LoadModule unixd_module lib/httpd/modules/mod_unixd.so
#LoadModule heartbeat_module lib/httpd/modules/mod_heartbeat.so
#LoadModule heartmonitor_module lib/httpd/modules/mod_heartmonitor.so
#LoadModule dav_module lib/httpd/modules/mod_dav.so
LoadModule status_module lib/httpd/modules/mod_status.so
LoadModule autoindex_module lib/httpd/modules/mod_autoindex.so
#LoadModule asis_module lib/httpd/modules/mod_asis.so
#LoadModule info_module lib/httpd/modules/mod_info.so
#LoadModule suexec_module lib/httpd/modules/mod_suexec.so
<IfModule !mpm_prefork_module>
	#LoadModule cgid_module lib/httpd/modules/mod_cgid.so
</IfModule>
<IfModule mpm_prefork_module>
	#LoadModule cgi_module lib/httpd/modules/mod_cgi.so
</IfModule>
#LoadModule dav_fs_module lib/httpd/modules/mod_dav_fs.so
#LoadModule dav_lock_module lib/httpd/modules/mod_dav_lock.so
#LoadModule vhost_alias_module lib/httpd/modules/mod_vhost_alias.so
#LoadModule negotiation_module lib/httpd/modules/mod_negotiation.so
LoadModule dir_module lib/httpd/modules/mod_dir.so
#LoadModule actions_module lib/httpd/modules/mod_actions.so
#LoadModule speling_module lib/httpd/modules/mod_speling.so
#LoadModule userdir_module lib/httpd/modules/mod_userdir.so
LoadModule alias_module lib/httpd/modules/mod_alias.so
LoadModule rewrite_module lib/httpd/modules/mod_rewrite.so

<IfModule unixd_module>
#
# If you wish httpd to run as a different user or group, you must run
# httpd as root initially and it will switch.  
#
# User/Group: The name (or #number) of the user/group to run httpd as.
# It is usually good practice to create a dedicated user and group for
# running httpd, as with most system services.
#
User _www
Group _www

</IfModule>

# 'Main' server configuration
#
# The directives in this section set up the values used by the 'main'
# server, which responds to any requests that aren't handled by a
# <VirtualHost> definition.  These values also provide defaults for
# any <VirtualHost> containers you may define later in the file.
#
# All of these directives may appear inside <VirtualHost> containers,
# in which case these default settings will be overridden for the
# virtual host being defined.
#

#
# ServerAdmin: Your address, where problems with the server should be
# e-mailed.  This address appears on some server-generated pages, such
# as error documents.  e.g. admin@your-domain.com
#
ServerAdmin you@example.com

#
# ServerName gives the name and port that the server uses to identify itself.
# This can often be determined automatically, but we recommend you specify
# it explicitly to prevent problems during startup.
#
# If your host doesn't have a registered DNS name, enter its IP address here.
#
#ServerName www.example.com:8080

#
# Deny access to the entirety of your server's filesystem. You must
# explicitly permit access to web content directories in other 
# <Directory> blocks below.
#
<Directory />
    AllowOverride none
    Require all denied
</Directory>

#
# Note that from this point forward you must specifically allow
# particular features to be enabled - so if something's not working as
# you might expect, make sure that you have specifically enabled it
# below.
#

#
# DocumentRoot: The directory out of which you will serve your
# documents. By default, all requests are taken from this directory, but
# symbolic links and aliases may be used to point to other locations.
#
DocumentRoot "/usr/local/homebrew/var/www"
<Directory "/usr/local/homebrew/var/www">
    #
    # Possible values for the Options directive are "None", "All",
    # or any combination of:
    #   Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews
    #
    # Note that "MultiViews" must be named *explicitly* --- "Options All"
    # doesn't give it to you.
    #
    # The Options directive is both complicated and important.  Please see
    # http://httpd.apache.org/docs/2.4/mod/core.html#options
    # for more information.
    #
    Options Indexes FollowSymLinks

    #
    # AllowOverride controls what directives may be placed in .htaccess files.
    # It can be "All", "None", or any combination of the keywords:
    #   AllowOverride FileInfo AuthConfig Limit
    #
    AllowOverride None

    #
    # Controls who can get stuff from this server.
    #
    Require all granted
</Directory>

#
# DirectoryIndex: sets the file that Apache will serve if a directory
# is requested.
#
<IfModule dir_module>
    DirectoryIndex index.html
</IfModule>

#
# The following lines prevent .htaccess and .htpasswd files from being 
# viewed by Web clients. 
#
<Files ".ht*">
    Require all denied
</Files>

#
# ErrorLog: The location of the error log file.
# If you do not specify an ErrorLog directive within a <VirtualHost>
# container, error messages relating to that virtual host will be
# logged here.  If you *do* define an error logfile for a <VirtualHost>
# container, that host's errors will be logged there and not here.
#
ErrorLog "/usr/local/homebrew/var/log/httpd/error_log"

#
# LogLevel: Control the number of messages logged to the error_log.
# Possible values include: debug, info, notice, warn, error, crit,
# alert, emerg.
#
LogLevel warn

<IfModule log_config_module>
    #
    # The following directives define some format nicknames for use with
    # a CustomLog directive (see below).
    #
    LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
    LogFormat "%h %l %u %t \"%r\" %>s %b" common

    <IfModule logio_module>
      # You need to enable mod_logio.c to use %I and %O
      LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio
    </IfModule>

    #
    # The location and format of the access logfile (Common Logfile Format).
    # If you do not define any access logfiles within a <VirtualHost>
    # container, they will be logged here.  Contrariwise, if you *do*
    # define per-<VirtualHost> access logfiles, transactions will be
    # logged therein and *not* in this file.
    #
    CustomLog "/usr/local/homebrew/var/log/httpd/access_log" common

    #
    # If you prefer a logfile with access, agent, and referer information
    # (Combined Logfile Format) you can use the following directive.
    #
    #CustomLog "/usr/local/homebrew/var/log/httpd/access_log" combined
</IfModule>

<IfModule alias_module>
    #
    # Redirect: Allows you to tell clients about documents that used to 
    # exist in your server's namespace, but do not anymore. The client 
    # will make a new request for the document at its new location.
    # Example:
    # Redirect permanent /foo http://www.example.com/bar

    #
    # Alias: Maps web paths into filesystem paths and is used to
    # access content that does not live under the DocumentRoot.
    # Example:
    # Alias /webpath /full/filesystem/path
    #
    # If you include a trailing / on /webpath then the server will
    # require it to be present in the URL.  You will also likely
    # need to provide a <Directory> section to allow access to
    # the filesystem path.

    #
    # ScriptAlias: This controls which directories contain server scripts. 
    # ScriptAliases are essentially the same as Aliases, except that
    # documents in the target directory are treated as applications and
    # run by the server when requested rather than as documents sent to the
    # client.  The same rules about trailing "/" apply to ScriptAlias
    # directives as to Alias.
    #
    ScriptAlias /cgi-bin/ "/usr/local/homebrew/var/www/cgi-bin/"

</IfModule>

<IfModule cgid_module>
    #
    # ScriptSock: On threaded servers, designate the path to the UNIX
    # socket used to communicate with the CGI daemon of mod_cgid.
    #
    #Scriptsock cgisock
</IfModule>

#
# "/usr/local/homebrew/var/www/cgi-bin" should be changed to whatever your ScriptAliased
# CGI directory exists, if you have that configured.
#
<Directory "/usr/local/homebrew/var/www/cgi-bin">
    AllowOverride None
    Options None
    Require all granted
</Directory>

<IfModule headers_module>
    #
    # Avoid passing HTTP_PROXY environment to CGI's on this or any proxied
    # backend servers which have lingering "httpoxy" defects.
    # 'Proxy' request header is undefined by the IETF, not listed by IANA
    #
    RequestHeader unset Proxy early
</IfModule>

<IfModule mime_module>
    #
    # TypesConfig points to the file containing the list of mappings from
    # filename extension to MIME-type.
    #
    TypesConfig /usr/local/homebrew/etc/httpd/mime.types

    #
    # AddType allows you to add to or override the MIME configuration
    # file specified in TypesConfig for specific file types.
    #
    #AddType application/x-gzip .tgz
    #
    # AddEncoding allows you to have certain browsers uncompress
    # information on the fly. Note: Not all browsers support this.
    #
    #AddEncoding x-compress .Z
    #AddEncoding x-gzip .gz .tgz
    #
    # If the AddEncoding directives above are commented-out, then you
    # probably should define those extensions to indicate media types:
    #
    AddType application/x-compress .Z
    AddType application/x-gzip .gz .tgz

    #
    # AddHandler allows you to map certain file extensions to "handlers":
    # actions unrelated to filetype. These can be either built into the server
    # or added with the Action directive (see below)
    #
    # To use CGI scripts outside of ScriptAliased directories:
    # (You will also need to add "ExecCGI" to the "Options" directive.)
    #
    #AddHandler cgi-script .cgi

    # For type maps (negotiated resources):
    #AddHandler type-map var

    #
    # Filters allow you to process content before it is sent to the client.
    #
    # To parse .shtml files for server-side includes (SSI):
    # (You will also need to add "Includes" to the "Options" directive.)
    #
    #AddType text/html .shtml
    #AddOutputFilter INCLUDES .shtml
</IfModule>

#
# The mod_mime_magic module allows the server to use various hints from the
# contents of the file itself to determine its type.  The MIMEMagicFile
# directive tells the module where the hint definitions are located.
#
#MIMEMagicFile /usr/local/homebrew/etc/httpd/magic

#
# Customizable error responses come in three flavors:
# 1) plain text 2) local redirects 3) external redirects
#
# Some examples:
#ErrorDocument 500 "The server made a boo boo."
#ErrorDocument 404 /missing.html
#ErrorDocument 404 "/cgi-bin/missing_handler.pl"
#ErrorDocument 402 http://www.example.com/subscription_info.html
#

#
# MaxRanges: Maximum number of Ranges in a request before
# returning the entire resource, or one of the special
# values 'default', 'none' or 'unlimited'.
# Default setting is to accept 200 Ranges.
#MaxRanges unlimited

#
# EnableMMAP and EnableSendfile: On systems that support it, 
# memory-mapping or the sendfile syscall may be used to deliver
# files.  This usually improves server performance, but must
# be turned off when serving from networked-mounted 
# filesystems or if support for these functions is otherwise
# broken on your system.
# Defaults: EnableMMAP On, EnableSendfile Off
#
#EnableMMAP off
#EnableSendfile on

# Supplemental configuration
#
# The configuration files in the /usr/local/homebrew/etc/httpd/extra/ directory can be 
# included to add extra features or to modify the default configuration of 
# the server, or you may simply copy their contents here and change as 
# necessary.

# Server-pool management (MPM specific)
#Include /usr/local/homebrew/etc/httpd/extra/httpd-mpm.conf

# Multi-language error messages
#Include /usr/local/homebrew/etc/httpd/extra/httpd-multilang-errordoc.conf

# Fancy directory listings
#Include /usr/local/homebrew/etc/httpd/extra/httpd-autoindex.conf

# Language settings
#Include /usr/local/homebrew/etc/httpd/extra/httpd-languages.conf

# User home directories
#Include /usr/local/homebrew/etc/httpd/extra/httpd-userdir.conf

# Real-time info on requests and configuration
#Include /usr/local/homebrew/etc/httpd/extra/httpd-info.conf

# Virtual hosts
#Include /usr/local/homebrew/etc/httpd/extra/httpd-vhosts.conf

# Local access to the Apache HTTP Server Manual
#Include /usr/local/homebrew/etc/httpd/extra/httpd-manual.conf

# Distributed authoring and versioning (WebDAV)
#Include /usr/local/homebrew/etc/httpd/extra/httpd-dav.conf

# Various default settings
#Include /usr/local/homebrew/etc/httpd/extra/httpd-default.conf

# Configure mod_proxy_html to understand HTML4/XHTML1
<IfModule proxy_html_module>
Include /usr/local/homebrew/etc/httpd/extra/proxy-html.conf
</IfModule>

# Secure (SSL/TLS) connections
#Include /usr/local/homebrew/etc/httpd/extra/httpd-ssl.conf
#
# Note: The following must must be present to support
#       starting without SSL on platforms with no /dev/random equivalent
#       but a statically compiled-in mod_ssl.
#
<IfModule ssl_module>
SSLRandomSeed startup builtin
SSLRandomSeed connect builtin
</IfModule>

/var/log/letsencrypt/letsencrypt.log

2024-02-10 19:45:52,864:DEBUG:certbot._internal.main:certbot version: 2.9.0
2024-02-10 19:45:52,865:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/local/homebrew/bin/certbot
2024-02-10 19:45:52,865:DEBUG:certbot._internal.main:Arguments: ['--apache', '-v']
2024-02-10 19:45:52,865:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-02-10 19:45:52,884:DEBUG:certbot._internal.log:Root logging level set at 20
2024-02-10 19:45:52,885:DEBUG:certbot._internal.plugins.selection:Requested authenticator apache and installer apache
2024-02-10 19:45:53,110:DEBUG:certbot_apache._internal.configurator:Apache version is 2.4.58
2024-02-10 19:45:53,286:WARNING:certbot_apache._internal.configurator:ssl_module is statically linked but --apache-bin is missing; not disabling session tickets.
2024-02-10 19:45:53,287:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * apache
Description: Apache Web Server plugin
Interfaces: Authenticator, Installer, Plugin
Entry point: EntryPoint(name='apache', value='certbot_apache._internal.entrypoint:ENTRYPOINT', group='certbot.plugins')
Initialized: <certbot_apache._internal.override_darwin.DarwinConfigurator object at 0x10415f830>
Prep: True
2024-02-10 19:45:53,288:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * apache
Description: Apache Web Server plugin
Interfaces: Authenticator, Installer, Plugin
Entry point: EntryPoint(name='apache', value='certbot_apache._internal.entrypoint:ENTRYPOINT', group='certbot.plugins')
Initialized: <certbot_apache._internal.override_darwin.DarwinConfigurator object at 0x10415f830>
Prep: True
2024-02-10 19:45:53,288:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot_apache._internal.override_darwin.DarwinConfigurator object at 0x10415f830> and installer <certbot_apache._internal.override_darwin.DarwinConfigurator object at 0x10415f830>
2024-02-10 19:45:53,288:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator apache, Installer apache
2024-02-10 19:45:53,339:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/1562413537', new_authzr_uri=None, terms_of_service=None), 396b4c32e22f0ff10c186fffd61a28ac, Meta(creation_dt=datetime.datetime(2024, 2, 9, 20, 4, 4, tzinfo=<UTC>), creation_host='ec2-52-26-148-183.us-west-2.compute.amazonaws.com', register_to_eff=None))>
2024-02-10 19:45:53,349:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-02-10 19:45:53,355:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-02-10 19:45:53,536:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2024-02-10 19:45:53,537:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 11 Feb 2024 00:45:53 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "CROCHvwPmzs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-02-10 19:45:56,560:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for test123domain.xyz
2024-02-10 19:45:56,566:DEBUG:acme.client:Requesting fresh nonce
2024-02-10 19:45:56,566:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-02-10 19:45:56,632:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-02-10 19:45:56,633:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 11 Feb 2024 00:45:56 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o5oIQq2BLHfsD78DSc03ln-CZwr1ZIB0UvtxpmS6EnjQ0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-02-10 19:45:56,634:DEBUG:acme.client:Storing nonce: 6HUcA-o5oIQq2BLHfsD78DSc03ln-CZwr1ZIB0UvtxpmS6EnjQ0
2024-02-10 19:45:56,634:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "test123domain.xyz"\n    }\n  ]\n}'
2024-02-10 19:45:56,639:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTU2MjQxMzUzNyIsICJub25jZSI6ICI2SFVjQS1vNW9JUXEyQkxIZnNENzhEU2MwM2xuLUNad3IxWklCMFV2dHhwbVM2RW5qUTAiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9",
  "signature": "XvnWOeHlOQ9nIlKhDX32Bi7h1bxXOGsraVMQa6uWR-w19tym2YixlnzAYQxmu4OkCyJsgl7pvcOmmAFRWbEzHhi8voHOWhGd0hgGrr66M4ksPOykqkz7W5tq8bCl8PosbTonBKTZqeB6udrRByI-zs4m1rXQWGqlq_xaSQQRVKZOFjCsPzOmYcan_EBc_HztV5lnaH-UAOgwfAtrR4klBU4MovnquEwBz_wolpSj1rlkEswrEcMkIOGa26YS46-L1UouQ-jCXRCSM2nQOM9Kc8U4fklOcAH42JGSFUz_0UPVTuHgN5X9RGVZ42xnZkFSHEYUnrj9ckjOy5PIhLyZ4g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlc3QxMjNkb21haW4ueHl6IgogICAgfQogIF0KfQ"
}
2024-02-10 19:45:56,840:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 343
2024-02-10 19:45:56,841:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 11 Feb 2024 00:45:56 GMT
Content-Type: application/json
Content-Length: 343
Connection: keep-alive
Boulder-Requester: 1562413537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/1562413537/243494024607
Replay-Nonce: 6HUcA-o5xDL1zr2wyxtkNh7y_UqQ8jPxNTR_lkzPC3mhJUALp4k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-02-18T00:45:56Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "test123domain.xyz"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313871287387"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1562413537/243494024607"
}
2024-02-10 19:45:56,841:DEBUG:acme.client:Storing nonce: 6HUcA-o5xDL1zr2wyxtkNh7y_UqQ8jPxNTR_lkzPC3mhJUALp4k
2024-02-10 19:45:56,842:DEBUG:acme.client:JWS payload:
b''
2024-02-10 19:45:56,844:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313871287387:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTU2MjQxMzUzNyIsICJub25jZSI6ICI2SFVjQS1vNXhETDF6cjJ3eXh0a05oN3lfVXFROGpQeE5UUl9sa3pQQzNtaEpVQUxwNGsiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzMxMzg3MTI4NzM4NyJ9",
  "signature": "n3e8SsWEG9iMIl1LoFOYdqI-Ky4blm0A8A3Keiub-YYOWUObOj73goBovooJ0hdYc5k4So3Cro2Tz_qJJZW4z_gPx3CqWYpimRFX_MMRPycK38XoT30XNgAoAUPsiAwXPIul_ijiXlkrazcShK_FwJC44cJ4C2-2_UwH7ObbX6b5KSBgh5UhEBzOg8oZ90i8nBTI30n7ZenMuXQmS0rCMUPFbK0rZCnMrpmP5Sg7Lgz_pAfGwzJm44QmKsI-a8mp1Wi51L07Z6M3Nb8JW-tDcvon3mCIyAhXYMIcnzls_H9csY33pT_4jlcl7bsD06vWbPIRmYVZzzvKMNPrfqYzpQ",
  "payload": ""
}
2024-02-10 19:45:56,909:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313871287387 HTTP/1.1" 200 801
2024-02-10 19:45:56,911:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 11 Feb 2024 00:45:56 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 1562413537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o5H1NOL4TsXxibw-I90ef5-Q_WMIRVTr7sVdEPs3YBbpk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "test123domain.xyz"
  },
  "status": "pending",
  "expires": "2024-02-18T00:45:56Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/Vnq-eA",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/K7NMxg",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/jKLWPA",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    }
  ]
}
2024-02-10 19:45:56,911:DEBUG:acme.client:Storing nonce: 6HUcA-o5H1NOL4TsXxibw-I90ef5-Q_WMIRVTr7sVdEPs3YBbpk
2024-02-10 19:45:56,912:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-02-10 19:45:56,912:INFO:certbot._internal.auth_handler:http-01 challenge for test123domain.xyz
2024-02-10 19:45:56,919:DEBUG:certbot_apache._internal.http_01:Adding a temporary challenge validation Include for name: test123domain.xyz in: /usr/local/homebrew/etc/httpd/httpd.conf
2024-02-10 19:45:56,919:DEBUG:certbot_apache._internal.http_01:Adding a temporary challenge validation Include for name: test123domain.xyz in: /usr/local/homebrew/etc/httpd/httpd.conf
2024-02-10 19:45:56,920:DEBUG:certbot_apache._internal.http_01:writing a pre config file with text:
         RewriteEngine on
        RewriteRule ^/\.well-known/acme-challenge/([A-Za-z0-9-_=]+)$ /var/lib/letsencrypt/http_challenges/$1 [END]
    
2024-02-10 19:45:56,920:DEBUG:certbot_apache._internal.http_01:writing a post config file with text:
         <Directory /var/lib/letsencrypt/http_challenges>
            Require all granted
        </Directory>
        <Location /.well-known/acme-challenge>
            Require all granted
        </Location>
    
2024-02-10 19:45:56,953:DEBUG:certbot.reverter:Creating backup of /usr/local/homebrew/etc/httpd/httpd.conf
2024-02-10 19:46:00,079:DEBUG:acme.client:JWS payload:
b'{}'
2024-02-10 19:46:00,083:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/Vnq-eA:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTU2MjQxMzUzNyIsICJub25jZSI6ICI2SFVjQS1vNUgxTk9MNFRzWHhpYnctSTkwZWY1LVFfV01JUlZUcjdzVmRFUHMzWUJicGsiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzMxMzg3MTI4NzM4Ny9WbnEtZUEifQ",
  "signature": "gGYvTUM1dOnxbCyNkbhqBdC0kukAgM0-xLdjMozRWIJlAVavkPyZ2SJWPTB9P3pxtlOiSrJ8vghddyNZ8pFaLtwK9e_bctGGc1Lf-Q_HgxElXpXtU-AvL76EF0Jk4pjZnYoFrJxPqvVc7pKmGARzfRVbW5074irNgCp_MpyFuYWC8czSsDt3sV8JOQJk_25P75_xed4XQ9Ecd93F3V1rNpMgWtYsYC-GTqxKs_3ZSGlaN7-tywsIS3iZjqLJUC5k668g6ElKSauJhPYMjK5AYk6aUamPpfZ801Cp0VQzhc93geuJdS1W0ikMAUmo9jp1QI37adYiAF0_JaRUgv7BZg",
  "payload": "e30"
}
2024-02-10 19:46:00,192:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/313871287387/Vnq-eA HTTP/1.1" 200 187
2024-02-10 19:46:00,193:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 11 Feb 2024 00:46:00 GMT
Content-Type: application/json
Content-Length: 187
Connection: keep-alive
Boulder-Requester: 1562413537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz-v3/313871287387>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/Vnq-eA
Replay-Nonce: 6HUcA-o5pNyQozll_ldXL3BIeZKuYbcZyE_dEVWSn2p4zPSp1N4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "type": "http-01",
  "status": "pending",
  "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/Vnq-eA",
  "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
}
2024-02-10 19:46:00,193:DEBUG:acme.client:Storing nonce: 6HUcA-o5pNyQozll_ldXL3BIeZKuYbcZyE_dEVWSn2p4zPSp1N4
2024-02-10 19:46:00,194:INFO:certbot._internal.auth_handler:Waiting for verification...
2024-02-10 19:46:01,199:DEBUG:acme.client:JWS payload:
b''
2024-02-10 19:46:01,204:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313871287387:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTU2MjQxMzUzNyIsICJub25jZSI6ICI2SFVjQS1vNXBOeVFvemxsX2xkWEwzQkllWkt1WWJjWnlFX2RFVldTbjJwNHpQU3AxTjQiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzMxMzg3MTI4NzM4NyJ9",
  "signature": "yj8AW0Qu-kChH-OzsPyhoatDFXGWknhy4hGlIOQdgRr-3NOZelyprA5dRXuS1ocGkY9Ytonhgii6_yINi9x_2xtjEDWIN19usq8wIsDItRgj9VjetH6-T5WXgwlRQ2FWkVxf0WZ5DkhnNIeDpb4cZAsXBBtBb7uBO9HK9wBNXL_Sj3udJHFHKhxk-hifiwQlBH5eQInNew9xJI7f61aa5rF_JaAlcizwD75QkND104SRoh967UDPxchsV0TYl4wmiOKT89cjHyDnHGv2zXE8UJ9ylRlNBUAsk3fuRtdLNm2whMgIv1nQntUNs0zqCVICE1fthybtRNblgPhSiq5Vvw",
  "payload": ""
}
2024-02-10 19:46:01,268:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313871287387 HTTP/1.1" 200 801
2024-02-10 19:46:01,269:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 11 Feb 2024 00:46:01 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 1562413537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o5PcQwfyJtl3DNVavSkNCPfIQQAcNSyQC__nAkgO8XuAY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "test123domain.xyz"
  },
  "status": "pending",
  "expires": "2024-02-18T00:45:56Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/Vnq-eA",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/K7NMxg",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/jKLWPA",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    }
  ]
}
2024-02-10 19:46:01,270:DEBUG:acme.client:Storing nonce: 6HUcA-o5PcQwfyJtl3DNVavSkNCPfIQQAcNSyQC__nAkgO8XuAY
2024-02-10 19:46:04,275:DEBUG:acme.client:JWS payload:
b''
2024-02-10 19:46:04,280:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313871287387:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTU2MjQxMzUzNyIsICJub25jZSI6ICI2SFVjQS1vNVBjUXdmeUp0bDNETlZhdlNrTkNQZklRUUFjTlN5UUNfX25Ba2dPOFh1QVkiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzMxMzg3MTI4NzM4NyJ9",
  "signature": "Oujs3xLtIogV4YP-C_r86HZBQYW4qGPdzX5FQ2dGWFUdY4fV9DYGLbo0XLa6cm77EdNmvnwh_rp_6lGInFT6ptk5TUdY6dQ2oyW21ZaJzWvgDMg3uZihojd4WmehtDTNAYzdcGsA4JFMGGDgVGwV46y-qPE5TiBaujoTyeQ7BEe6zFX1mJS1MefQjFikwImw14wMpmRJu8xJmP2K5Mr4v7pJwLGGXIyBTzBbITxZKU4kDb_XazBJrPdOyq904jzie0OPEHBmneXlF_K-Yqq8Zzpte7HKxHXuOuIB9WXupluGUs5Mqj9kQEP7ikrgLZF6bDMQ8A_6_3e7Cz1zv6zq7A",
  "payload": ""
}
2024-02-10 19:46:04,395:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313871287387 HTTP/1.1" 200 801
2024-02-10 19:46:04,396:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 11 Feb 2024 00:46:04 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 1562413537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o51KtvRN-VtTAfRAE5ce5xeCPhDfNwJAgxzqsXMuN11G8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "test123domain.xyz"
  },
  "status": "pending",
  "expires": "2024-02-18T00:45:56Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/Vnq-eA",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/K7NMxg",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/jKLWPA",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    }
  ]
}
2024-02-10 19:46:04,396:DEBUG:acme.client:Storing nonce: 6HUcA-o51KtvRN-VtTAfRAE5ce5xeCPhDfNwJAgxzqsXMuN11G8
2024-02-10 19:46:07,404:DEBUG:acme.client:JWS payload:
b''
2024-02-10 19:46:07,407:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313871287387:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTU2MjQxMzUzNyIsICJub25jZSI6ICI2SFVjQS1vNTFLdHZSTi1WdFRBZlJBRTVjZTV4ZUNQaERmTndKQWd4enFzWE11TjExRzgiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzMxMzg3MTI4NzM4NyJ9",
  "signature": "qrvBa9RMFHNZciYN_OlcI57OFhnwlUczsRTr1lmEzfTdlRlDqMuyPnjeowahFKEzQKXdDjHeAB-FFTj7yBHkRwDMDvVMgFy0xJy0uZxBPQRSivsn1zqNztXkstV3YHj6RL4Z5f6qLVIlgzEDB6Dk9MS2rewZFtAzAURwrCW1PillsLae5H0nPreWjDSr9mGOx2JTBP7r6v0YrjfN1LU4x1vwYif39LMdrnjrW8XpewXHUswwm9BS2lOxMGcYWN4HSl8J746RPjxofgKey_1qZbwiOHt8BhHudprWWzPoAmsPG8YoreFEJ1JoSJnD6-t3yugLj6xfu08osL8jou1IVg",
  "payload": ""
}
2024-02-10 19:46:07,474:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313871287387 HTTP/1.1" 200 801
2024-02-10 19:46:07,475:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 11 Feb 2024 00:46:07 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 1562413537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HWHXB1ulavvpSHk3lwPjJtAGxJ39P0vhmPRmeu3WtxZc0Rc3S8g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "test123domain.xyz"
  },
  "status": "pending",
  "expires": "2024-02-18T00:45:56Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/Vnq-eA",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/K7NMxg",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/jKLWPA",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    }
  ]
}
2024-02-10 19:46:07,475:DEBUG:acme.client:Storing nonce: HWHXB1ulavvpSHk3lwPjJtAGxJ39P0vhmPRmeu3WtxZc0Rc3S8g
2024-02-10 19:46:10,479:DEBUG:acme.client:JWS payload:
b''
2024-02-10 19:46:10,482:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313871287387:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTU2MjQxMzUzNyIsICJub25jZSI6ICJIV0hYQjF1bGF2dnBTSGszbHdQakp0QUd4SjM5UDB2aG1QUm1ldTNXdHhaYzBSYzNTOGciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzMxMzg3MTI4NzM4NyJ9",
  "signature": "LvSt4Og_SdHmV9Z2TGzLUlwztyOXuhX7i4rOQu2T_rPSHpw0vM6jVNbInYghUDTwGm0cihs_mIEVwoISwbHEVTUrIfaQXULCuaBdQbZERf2tUAYqmUcMnXUGbQUVcUv_8Dg0jbBLl1Br4wzyvdgsB7iIRdCdIZjYJWVHSDSP_uABJEcbrRIzrzpyRCM2ivZFs1TCOdDF-Qf9BEa6ILmj5YROXF9HS95JkGPsxzdX4cgq7czawl6MMniLKA395yBvRJ1LuMRHdlMBnjadMxKpxtr1IZ2qPlex00vLJpW-OVkfX4S7k7L6sQY14t7GYo4G6QSpbZq3RISw8rAulLhpWg",
  "payload": ""
}
2024-02-10 19:46:10,573:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313871287387 HTTP/1.1" 200 801
2024-02-10 19:46:10,575:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 11 Feb 2024 00:46:10 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 1562413537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: HWHXB1ul-gIcAulmsoiyD-VVtJYkDLb-7PCRFmeL0GDvQ-7v1pY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "test123domain.xyz"
  },
  "status": "pending",
  "expires": "2024-02-18T00:45:56Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/Vnq-eA",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/K7NMxg",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/jKLWPA",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38"
    }
  ]
}
2024-02-10 19:46:10,575:DEBUG:acme.client:Storing nonce: HWHXB1ul-gIcAulmsoiyD-VVtJYkDLb-7PCRFmeL0GDvQ-7v1pY
2024-02-10 19:46:13,581:DEBUG:acme.client:JWS payload:
b''
2024-02-10 19:46:13,583:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313871287387:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTU2MjQxMzUzNyIsICJub25jZSI6ICJIV0hYQjF1bC1nSWNBdWxtc29peUQtVlZ0SllrRExiLTdQQ1JGbWVMMEdEdlEtN3YxcFkiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzMxMzg3MTI4NzM4NyJ9",
  "signature": "g_e7BWGBw4PXJdRmOYKLZkHLkakGjgNLs6r5sjXLGNwnZ1JYLtyDsq5_v7FhxKk9NeFWIo8SKn6RA4W8RheE5KNJCfsX6_8C90VsSsp-jUq2cIAbuz9Fwilx4StuFlBE7c0ADYcDtg97uXwFckJPJknOG1EgKpCPdFhBRhdXIjafTgzhquEu_JjbwoCMmli2yBfBFDtRlc7kwdqEqBpMcLmnBL6ROap-l5S5jr2RH_ZD-sUWyOKP_J_bfG_49e_nQFuH8tjcoMjXcoQff9U0MqpaM4SK20SdRzKfAL-MvSI-aTTqw9OYKDod4GQNly_SJKKfEvJ0x1CAoxLINiUM7Q",
  "payload": ""
}
2024-02-10 19:46:13,650:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313871287387 HTTP/1.1" 200 1178
2024-02-10 19:46:13,652:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 11 Feb 2024 00:46:13 GMT
Content-Type: application/json
Content-Length: 1178
Connection: keep-alive
Boulder-Requester: 1562413537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 6HUcA-o521McGA13sobi-RJYxwzj1XjvYsu-wH5TVhxOX8hGecM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "test123domain.xyz"
  },
  "status": "invalid",
  "expires": "2024-02-18T00:45:56Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "invalid",
      "error": {
        "type": "urn:ietf:params:acme:error:connection",
        "detail": "104.171.54.23: Fetching http://test123domain.xyz/.well-known/acme-challenge/A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38: Timeout during connect (likely firewall problem)",
        "status": 400
      },
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313871287387/Vnq-eA",
      "token": "A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38",
      "validationRecord": [
        {
          "url": "http://test123domain.xyz/.well-known/acme-challenge/A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38",
          "hostname": "test123domain.xyz",
          "port": "80",
          "addressesResolved": [
            "104.171.54.23"
          ],
          "addressUsed": "104.171.54.23",
          "resolverAddrs": [
            "A:10.1.12.81:20241",
            "AAAA:10.1.12.83:21802"
          ]
        }
      ],
      "validated": "2024-02-11T00:46:00Z"
    }
  ]
}
2024-02-10 19:46:13,654:DEBUG:acme.client:Storing nonce: 6HUcA-o521McGA13sobi-RJYxwzj1XjvYsu-wH5TVhxOX8hGecM
2024-02-10 19:46:13,655:INFO:certbot._internal.auth_handler:Challenge failed for domain test123domain.xyz
2024-02-10 19:46:13,655:INFO:certbot._internal.auth_handler:http-01 challenge for test123domain.xyz
2024-02-10 19:46:13,655:DEBUG:certbot._internal.display.obj:Notifying user: 
Certbot failed to authenticate some domains (authenticator: apache). The Certificate Authority reported these problems:
  Domain: test123domain.xyz
  Type:   connection
  Detail: 104.171.54.23: Fetching http://test123domain.xyz/.well-known/acme-challenge/A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38: Timeout during connect (likely firewall problem)

Hint: The Certificate Authority failed to verify the temporary Apache configuration changes made by Certbot. Ensure that the listed domains point to this Apache server and that it is accessible from the internet.

2024-02-10 19:46:13,658:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "/usr/local/homebrew/Cellar/certbot/2.9.0/libexec/lib/python3.12/site-packages/certbot/_internal/auth_handler.py", line 108, in handle_authorizations
    self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
  File "/usr/local/homebrew/Cellar/certbot/2.9.0/libexec/lib/python3.12/site-packages/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations
    raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

2024-02-10 19:46:13,658:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-02-10 19:46:13,658:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-02-10 19:46:13,829:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "/usr/local/homebrew/bin/certbot", line 8, in <module>
    sys.exit(main())
             ^^^^^^
  File "/usr/local/homebrew/Cellar/certbot/2.9.0/libexec/lib/python3.12/site-packages/certbot/main.py", line 19, in main
    return internal_main.main(cli_args)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/local/homebrew/Cellar/certbot/2.9.0/libexec/lib/python3.12/site-packages/certbot/_internal/main.py", line 1894, in main
    return config.func(config, plugins)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/local/homebrew/Cellar/certbot/2.9.0/libexec/lib/python3.12/site-packages/certbot/_internal/main.py", line 1600, in certonly
    lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/local/homebrew/Cellar/certbot/2.9.0/libexec/lib/python3.12/site-packages/certbot/_internal/main.py", line 143, in _get_and_save_cert
    lineage = le_client.obtain_and_enroll_certificate(domains, certname)
              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/local/homebrew/Cellar/certbot/2.9.0/libexec/lib/python3.12/site-packages/certbot/_internal/client.py", line 517, in obtain_and_enroll_certificate
    cert, chain, key, _ = self.obtain_certificate(domains)
                          ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/local/homebrew/Cellar/certbot/2.9.0/libexec/lib/python3.12/site-packages/certbot/_internal/client.py", line 428, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/local/homebrew/Cellar/certbot/2.9.0/libexec/lib/python3.12/site-packages/certbot/_internal/client.py", line 496, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/local/homebrew/Cellar/certbot/2.9.0/libexec/lib/python3.12/site-packages/certbot/_internal/auth_handler.py", line 108, in handle_authorizations
    self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
  File "/usr/local/homebrew/Cellar/certbot/2.9.0/libexec/lib/python3.12/site-packages/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations
    raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2024-02-10 19:46:13,831:ERROR:certbot._internal.log:Some challenges have failed.

I have one question:
Do you own/control the domain "test123domain.xyz"?

And one observation: LE can't reach that site via HTTP; As shown in the error message below.
"detail": "104.171.54.23: Fetching http://test123domain.xyz/.well-known/acme-challenge/A7HAIjl23t7khlUDfm27Cp-q3oUfF_9Mup95LyH-E38: Timeout during connect (likely firewall problem)"

3 Likes

You need to have port 80 open for the HTTP Challenge done by the --apache plugin. You have port 443 open so you just need to do something similar for port 80

nmap -p80,443  test123domain.xyz
Nmap scan report for test123domain.xyz (104.171.54.23)
PORT    STATE    SERVICE
80/tcp  filtered http
443/tcp open     https
3 Likes

Your system is not able to connect on TCP port 80 (http) but does connect over TCP port 443 (https).

Your IP is a Cable internet company - are you 100% sure they support HTTP hosting? That's required for using HTTP validation to confirm your domain control with Let's Encrypt.

Alternatives are DNS validation or tls-alpn-01 (validation over port 443)

3 Likes

I think I know why ISP blocks port 80, thanks both for the diagnosis and suggestions.

3 Likes

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.