2023-05-10 15:00:18,511:DEBUG:certbot._internal.main:certbot version: 1.21.0 2023-05-10 15:00:18,511:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2023-05-10 15:00:18,511:DEBUG:certbot._internal.main:Arguments: ['--apache'] 2023-05-10 15:00:18,511:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-05-10 15:00:18,520:DEBUG:certbot._internal.log:Root logging level set at 30 2023-05-10 15:00:18,522:DEBUG:certbot._internal.plugins.selection:Requested authenticator apache and installer apache 2023-05-10 15:00:18,630:DEBUG:certbot_apache._internal.configurator:Apache version is 2.4.52 2023-05-10 15:00:18,896:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * apache Description: Apache Web Server plugin Interfaces: Installer, Authenticator, Plugin Entry point: apache = certbot_apache._internal.entrypoint:ENTRYPOINT Initialized: Prep: True 2023-05-10 15:00:18,897:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer 2023-05-10 15:00:18,897:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator apache, Installer apache 2023-05-10 15:00:18,935:DEBUG:certbot._internal.main:Picked account: ), creation_host='DESKTOP-CR7FQ7P.localdomain', register_to_eff=None))> 2023-05-10 15:00:18,935:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-05-10 15:00:18,937:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-05-10 15:00:19,361:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 756 2023-05-10 15:00:19,362:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 May 2023 13:00:19 GMT Content-Type: application/json Content-Length: 756 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4SAGJU5HfG4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-05-10 15:00:23,539:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for wiki.wsi.med.uni-muenchen.de 2023-05-10 15:00:23,762:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0025_key-certbot.pem 2023-05-10 15:00:23,768:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0025_csr-certbot.pem 2023-05-10 15:00:23,769:DEBUG:acme.client:Requesting fresh nonce 2023-05-10 15:00:23,769:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-05-10 15:00:23,909:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-05-10 15:00:23,910:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 May 2023 13:00:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5CA2nZr2z_Ebg50VINozckr67KISxhvpB1Xk_RAkwb02iO8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-05-10 15:00:23,911:DEBUG:acme.client:Storing nonce: 5CA2nZr2z_Ebg50VINozckr67KISxhvpB1Xk_RAkwb02iO8 2023-05-10 15:00:23,912:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "wiki.wsi.med.uni-muenchen.de"\n }\n ]\n}' 2023-05-10 15:00:23,914:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTA5OTYwMTIyNyIsICJub25jZSI6ICI1Q0EyblpyMnpfRWJnNTBWSU5vemNrcjY3S0lTeGh2cEIxWGtfUkFrd2IwMmlPOCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0", "signature": "KgRuk6KKNqVdUMqUTPsQIImpk8lt0XDFLVXTV9ylW5TAFHNVMRoI8wukFgenDpTZRWUxLg3yt8CHfx0UwfLmrgIm4vyj_iDbqdlMJYqxnTlkAUb90aukY9L6HsAkvWnUv80nt7EC1SUw8CzBkW39EXlsrt4aKwE4M5YN3qUCu89rmx8XIjTPPmkMg-owtYRueCDR5fqdVMfD7xEhygRFjv1r6_ba-scItY5qoQCYEkLyVbj25lQtoOD7bXfe2fBFOQUycA02nY0lgRgG7wvzn6lj3My-N4E4kv11b3P4MPW63LLZTD11I_TIJKyprxk06zaBBMtBxMjfgHS5xV_SEQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIndpa2kud3NpLm1lZC51bmktbXVlbmNoZW4uZGUiCiAgICB9CiAgXQp9" } 2023-05-10 15:00:24,183:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 354 2023-05-10 15:00:24,185:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 May 2023 13:00:24 GMT Content-Type: application/json Content-Length: 354 Connection: keep-alive Boulder-Requester: 1099601227 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1099601227/181317650917 Replay-Nonce: 5CA2NZUO5FTj553hp2KorZMUlFwTpEgxaIx0OwLgttEB_7k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-05-17T13:00:24Z", "identifiers": [ { "type": "dns", "value": "wiki.wsi.med.uni-muenchen.de" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/226587793877" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1099601227/181317650917" } 2023-05-10 15:00:24,185:DEBUG:acme.client:Storing nonce: 5CA2NZUO5FTj553hp2KorZMUlFwTpEgxaIx0OwLgttEB_7k 2023-05-10 15:00:24,186:DEBUG:acme.client:JWS payload: b'' 2023-05-10 15:00:24,188:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/226587793877: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTA5OTYwMTIyNyIsICJub25jZSI6ICI1Q0EyTlpVTzVGVGo1NTNocDJLb3JaTVVsRndUcEVneGFJeDBPd0xndHRFQl83ayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjI2NTg3NzkzODc3In0", "signature": "JamsFnWvmQKY2TvGM3s68Q0MkEiahYeSwaD9q1XQKH61hbTOlm6Up7OVMpFc06nBmrajiHmvW-VlnC9GFSp3xOKLTizXHvyoBxV5twdKihpZX_TykRK_GXJGYaI6xze7SSzWli39EemQbffRo8mAIDRYlVsWiZR4vfyQviUmGTYC_OyWhx47hDdwupD6kiLPk8HabVwrK7ZsE5VSw9sI3pPMn-vWC1do5El16UmOw5rLyo-2dLBYn2Fo66feI1KqD5FlQTXnay-BtBZlROaVlRkmssTgM_7Xc44ogZ8mphv9y6XG838YwFVb15CQZQPtZtJbwvtFwadhOnqitjUFAQ", "payload": "" } 2023-05-10 15:00:24,330:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/226587793877 HTTP/1.1" 200 812 2023-05-10 15:00:24,331:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 May 2023 13:00:24 GMT Content-Type: application/json Content-Length: 812 Connection: keep-alive Boulder-Requester: 1099601227 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 371C_yzadsa0zH_P-JGY78WbiUV7J8SKVoA4ZOFPQ5OuxXw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "wiki.wsi.med.uni-muenchen.de" }, "status": "pending", "expires": "2023-05-17T13:00:24Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/226587793877/O6miGQ", "token": "JaXT4_09NpRX0cpvHQmKEh4N2i5GyeaXe8Y4q2nGMic" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/226587793877/code7A", "token": "JaXT4_09NpRX0cpvHQmKEh4N2i5GyeaXe8Y4q2nGMic" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/226587793877/bFv1-A", "token": "JaXT4_09NpRX0cpvHQmKEh4N2i5GyeaXe8Y4q2nGMic" } ] } 2023-05-10 15:00:24,332:DEBUG:acme.client:Storing nonce: 371C_yzadsa0zH_P-JGY78WbiUV7J8SKVoA4ZOFPQ5OuxXw 2023-05-10 15:00:24,333:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-05-10 15:00:24,333:INFO:certbot._internal.auth_handler:http-01 challenge for wiki.wsi.med.uni-muenchen.de 2023-05-10 15:00:24,434:INFO:certbot_apache._internal.override_debian:Enabled Apache rewrite module 2023-05-10 15:00:24,635:DEBUG:certbot_apache._internal.http_01:Adding a temporary challenge validation Include for name: wiki.wsi.med.uni-muenchen.de in: /etc/apache2/sites-enabled/000-default.conf 2023-05-10 15:00:24,636:DEBUG:certbot_apache._internal.http_01:Adding a temporary challenge validation Include for name: wiki.wsi.med.uni-muenchen.de in: /etc/apache2/sites-enabled/default-ssl.conf 2023-05-10 15:00:24,649:DEBUG:certbot_apache._internal.http_01:writing a pre config file with text: RewriteEngine on RewriteRule ^/\.well-known/acme-challenge/([A-Za-z0-9-_=]+)$ /var/lib/letsencrypt/http_challenges/$1 [END] 2023-05-10 15:00:24,649:DEBUG:certbot_apache._internal.http_01:writing a post config file with text: Require all granted Require all granted 2023-05-10 15:00:24,685:DEBUG:certbot.reverter:Creating backup of /etc/apache2/sites-enabled/000-default.conf 2023-05-10 15:00:24,687:DEBUG:certbot.reverter:Creating backup of /etc/apache2/sites-enabled/default-ssl.conf 2023-05-10 15:00:27,910:DEBUG:acme.client:JWS payload: b'{}' 2023-05-10 15:00:27,913:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/226587793877/O6miGQ: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTA5OTYwMTIyNyIsICJub25jZSI6ICIzNzFDX3l6YWRzYTB6SF9QLUpHWTc4V2JpVVY3SjhTS1ZvQTRaT0ZQUTVPdXhYdyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjI2NTg3NzkzODc3L082bWlHUSJ9", "signature": "fltxvagH8OgzaTo6gqt-LGn85hfdvnYBLl9ILar1gtPRbVM4JCa6FiSzMyD1oJ0lgMW5ysKdCDI4iztDLV7QCYZu4XTzHucpPNjOpdJqcMiZi_Nik4dQ3IiyF9pKEc_gfBa9O_Sj8o-lZ-HGeg55m9Uib1qC2OlvhSIZvUHLecy2EA4R3sjtagJmXhPnvmv2yg5xkVajtYxWPZfn05VpWomfOcIVa69Yy2LEOqY545WnzG5Zen0_sP55ycDbn6BeG0_TQpBq-2gIAvDldN90HJPBgwJxvSKq8tWcfwVXZ0YdotjM0uUrkomzruWhX8Lnt7inLMHPp1H4_9bN5_Gw0A", "payload": "e30" } 2023-05-10 15:00:28,058:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/226587793877/O6miGQ HTTP/1.1" 200 187 2023-05-10 15:00:28,059:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 May 2023 13:00:28 GMT Content-Type: application/json Content-Length: 187 Connection: keep-alive Boulder-Requester: 1099601227 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/226587793877/O6miGQ Replay-Nonce: 5CA2km-hxk_O9qtdL6o9fvfdq2a1rCe69g95OYT0t-6UIiU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/226587793877/O6miGQ", "token": "JaXT4_09NpRX0cpvHQmKEh4N2i5GyeaXe8Y4q2nGMic" } 2023-05-10 15:00:28,060:DEBUG:acme.client:Storing nonce: 5CA2km-hxk_O9qtdL6o9fvfdq2a1rCe69g95OYT0t-6UIiU 2023-05-10 15:00:28,061:INFO:certbot._internal.auth_handler:Waiting for verification... 2023-05-10 15:00:29,062:DEBUG:acme.client:JWS payload: b'' 2023-05-10 15:00:29,063:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/226587793877: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTA5OTYwMTIyNyIsICJub25jZSI6ICI1Q0Eya20taHhrX085cXRkTDZvOWZ2ZmRxMmExckNlNjlnOTVPWVQwdC02VUlpVSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjI2NTg3NzkzODc3In0", "signature": "EYNDTXZDFIRTtCwkAUNZkEpKly3RJsvEzQsyC-Z4slfeaPC3qw3_Wv7lDP2dKyCcrhk7gWfMupOdNjhYjHVXquBEFaAL_yZBYmJKSOFJlTOylx_Hgh_9faxY-mGaoQIiFnl1FmhScXihfeNG1FXMALSs2e-wtIIb7SdZVR4vvN8hhn9uXbBPXFy8veD_XZ8WYGWFePgNyNkdobuqaz4SyGAoKW4LviTme5IOQDNbSNp2hrpedQZNuZgywqWrXVbW28HxfrmomPY7DvrB9lAKkT8RcpN096Q1PrXlm9mIP73wt0isXxJFRb1FxFfsopjFMyPvDXRdpRD4IWhJUpIndw", "payload": "" } 2023-05-10 15:00:29,204:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/226587793877 HTTP/1.1" 200 812 2023-05-10 15:00:29,205:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 May 2023 13:00:29 GMT Content-Type: application/json Content-Length: 812 Connection: keep-alive Boulder-Requester: 1099601227 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5CA2KLRYoj4SSWC5twQAogp2yFB2oRJecTOl3jJVE_w1FB8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "wiki.wsi.med.uni-muenchen.de" }, "status": "pending", "expires": "2023-05-17T13:00:24Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/226587793877/O6miGQ", "token": "JaXT4_09NpRX0cpvHQmKEh4N2i5GyeaXe8Y4q2nGMic" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/226587793877/code7A", "token": "JaXT4_09NpRX0cpvHQmKEh4N2i5GyeaXe8Y4q2nGMic" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/226587793877/bFv1-A", "token": "JaXT4_09NpRX0cpvHQmKEh4N2i5GyeaXe8Y4q2nGMic" } ] } 2023-05-10 15:00:29,206:DEBUG:acme.client:Storing nonce: 5CA2KLRYoj4SSWC5twQAogp2yFB2oRJecTOl3jJVE_w1FB8 2023-05-10 15:00:32,208:DEBUG:acme.client:JWS payload: b'' 2023-05-10 15:00:32,211:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/226587793877: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTA5OTYwMTIyNyIsICJub25jZSI6ICI1Q0EyS0xSWW9qNFNTV0M1dHdRQW9ncDJ5RkIyb1JKZWNUT2wzakpWRV93MUZCOCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjI2NTg3NzkzODc3In0", "signature": "gZVR32zWYWpLiBftGLDcAYEPDPHvznnQROy1kjsXLvHqYsYC4_HdPultedT5RA2bXzWk9JGu2ogAh_uD3oBrrC18TAUcPVFpV-GcHZ7WIPtGf122HWcZXdHQ-CtHV1ol6xidPFx9YaXFuMB_ArB-A3mHZZ-SXtBsLQk9IkiIZiVeMIzoUOkYOzL9nJ8dLv6L4kvhO9t-21DoJxy_hpWRa295ab6e7hutBRmB2pucyh3b9G1MwNQAco3UV0wV13lKE2LNCVackMF0BeZLpoVWsFNZ3vvpiWttyFnCZ0PWKVxU48mIw7g8e67jvuyYxoRK3vayk2g158k4X2VaavpBcw", "payload": "" } 2023-05-10 15:00:32,356:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/226587793877 HTTP/1.1" 200 1080 2023-05-10 15:00:32,357:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 May 2023 13:00:32 GMT Content-Type: application/json Content-Length: 1080 Connection: keep-alive Boulder-Requester: 1099601227 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 371CI_pIDI27jpgj6X07FIik5TNUr29RpeoqZuDLoXSwzzY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "wiki.wsi.med.uni-muenchen.de" }, "status": "invalid", "expires": "2023-05-17T13:00:24Z", "challenges": [ { "type": "http-01", "status": "invalid", "error": { "type": "urn:ietf:params:acme:error:unauthorized", "detail": "138.244.128.5: Invalid response from http://wiki.wsi.med.uni-muenchen.de/.well-known/acme-challenge/JaXT4_09NpRX0cpvHQmKEh4N2i5GyeaXe8Y4q2nGMic: 503", "status": 403 }, "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/226587793877/O6miGQ", "token": "JaXT4_09NpRX0cpvHQmKEh4N2i5GyeaXe8Y4q2nGMic", "validationRecord": [ { "url": "http://wiki.wsi.med.uni-muenchen.de/.well-known/acme-challenge/JaXT4_09NpRX0cpvHQmKEh4N2i5GyeaXe8Y4q2nGMic", "hostname": "wiki.wsi.med.uni-muenchen.de", "port": "80", "addressesResolved": [ "138.244.128.5" ], "addressUsed": "138.244.128.5" } ], "validated": "2023-05-10T13:00:28Z" } ] } 2023-05-10 15:00:32,358:DEBUG:acme.client:Storing nonce: 371CI_pIDI27jpgj6X07FIik5TNUr29RpeoqZuDLoXSwzzY 2023-05-10 15:00:32,359:INFO:certbot._internal.auth_handler:Challenge failed for domain wiki.wsi.med.uni-muenchen.de 2023-05-10 15:00:32,359:INFO:certbot._internal.auth_handler:http-01 challenge for wiki.wsi.med.uni-muenchen.de 2023-05-10 15:00:32,360:DEBUG:certbot._internal.display.obj:Notifying user: Certbot failed to authenticate some domains (authenticator: apache). The Certificate Authority reported these problems: Domain: wiki.wsi.med.uni-muenchen.de Type: unauthorized Detail: 138.244.128.5: Invalid response from http://wiki.wsi.med.uni-muenchen.de/.well-known/acme-challenge/JaXT4_09NpRX0cpvHQmKEh4N2i5GyeaXe8Y4q2nGMic: 503 Hint: The Certificate Authority failed to verify the temporary Apache configuration changes made by Certbot. Ensure that the listed domains point to this Apache server and that it is accessible from the internet. 2023-05-10 15:00:32,361:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 90, in handle_authorizations self._poll_authorizations(authzrs, max_retries, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 178, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2023-05-10 15:00:32,361:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-05-10 15:00:32,361:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-05-10 15:00:32,722:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1287, in run new_lineage = _get_and_save_cert(le_client, config, domains, File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 90, in handle_authorizations self._poll_authorizations(authzrs, max_retries, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 178, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2023-05-10 15:00:32,723:ERROR:certbot._internal.log:Some challenges have failed.