2024-11-14 10:31:23,678:DEBUG:certbot._internal.main:certbot version: 3.0.0 2024-11-14 10:31:23,678:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/local/bin/certbot 2024-11-14 10:31:23,678:DEBUG:certbot._internal.main:Arguments: ['--webroot', '--webroot-path', '/usr/share/nginx/html/letsencrypt', '--dry-run', '-d', 'scraping.slassurances.fr'] 2024-11-14 10:31:23,678:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-14 10:31:23,698:DEBUG:certbot._internal.log:Root logging level set at 30 2024-11-14 10:31:23,700:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None 2024-11-14 10:31:23,700:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot Description: Saves the necessary validation files to a .well-known/acme-challenge/ directory within the nominated webroot path. A separate HTTP server must be running and serving files from the webroot path. HTTP challenge only (wildcards not supported). Interfaces: Authenticator, Plugin Entry point: EntryPoint(name='webroot', value='certbot._internal.plugins.webroot:Authenticator', group='certbot.plugins') Initialized: Prep: True 2024-11-14 10:31:23,701:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 10:31:23,701:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None 2024-11-14 10:31:23,771:DEBUG:certbot._internal.main:Picked account: ), creation_host='724f11395b0d', register_to_eff=None))> 2024-11-14 10:31:23,772:DEBUG:acme.client:Sending GET request to https://acme-staging-v02.api.letsencrypt.org/directory. 2024-11-14 10:31:23,774:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging-v02.api.letsencrypt.org:443 2024-11-14 10:31:26,618:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 820 2024-11-14 10:31:26,619:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 10:31:26 GMT Content-Type: application/json Content-Length: 820 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "aeDCbXWLq7c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org/docs/staging-environment/" }, "newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-staging-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 10:31:26,668:DEBUG:certbot._internal.display.obj:Notifying user: Simulating a certificate request for scraping.slassurances.fr 2024-11-14 10:31:26,670:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 10:31:26,671:DEBUG:acme.client:Sending HEAD request to https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 10:31:26,808:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 10:31:26,809:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 10:31:26 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5taWkFMtHwJMDUQIOQJtUT6WMHMUhkN8YMsMdjNIEuLBtYg3O2o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 10:31:26,809:DEBUG:acme.client:Storing nonce: 5taWkFMtHwJMDUQIOQJtUT6WMHMUhkN8YMsMdjNIEuLBtYg3O2o 2024-11-14 10:31:26,810:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "scraping.slassurances.fr"\n }\n ]\n}' 2024-11-14 10:31:26,816:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8xNDQ3NDg0NzQiLCAibm9uY2UiOiAiNXRhV2tGTXRId0pNRFVRSU9RSnRVVDZXTUhNVWhrTjhZTXNNZGpOSUV1TEJ0WWczTzJvIiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "CWX181zogDxIFnLlxCZ0dwvriN9QRqxarCe4mUf-0LknrSPOtLbQCBkO5rptOZ4N7-R_hDycFU54c8qrEgpRtXU2NNXiC9n4sybLig9pkq9OeBN4oWDq_1DsGTdbl69ICzM7CxsVyjHyPu1daW_ls40XgDyFO0C3ZyPdIpjpOwhWqX8AlUIGHm_NeVIDvkqAwKXUekcvbotzMJf5d8sG1DEAfbNVB6qm3RQAUY6_UqAuhYoc7BnPhUoZQWxLJuSdzw29apbQerICCr1ffijIdu7bh3FOd9mg-kyExY9O-xkgXf_cIDkjlQ3EARot98yzrzGd2OHJRM2RThjLGKbN5Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNjcmFwaW5nLnNsYXNzdXJhbmNlcy5mciIKICAgIH0KICBdCn0" } 2024-11-14 10:31:27,009:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 363 2024-11-14 10:31:27,010:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 10:31:26 GMT Content-Type: application/json Content-Length: 363 Connection: keep-alive Boulder-Requester: 144748474 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/144748474/20490598743 Replay-Nonce: yD2Ehyc2qkWm2LY-GyA9uF1-lcCAVJ5-ho3mFAfapJ7F1FasG50 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T10:31:26Z", "identifiers": [ { "type": "dns", "value": "scraping.slassurances.fr" } ], "authorizations": [ "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/14907340843" ], "finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/144748474/20490598743" } 2024-11-14 10:31:27,011:DEBUG:acme.client:Storing nonce: yD2Ehyc2qkWm2LY-GyA9uF1-lcCAVJ5-ho3mFAfapJ7F1FasG50 2024-11-14 10:31:27,011:DEBUG:acme.client:JWS payload: b'' 2024-11-14 10:31:27,015:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/14907340843: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8xNDQ3NDg0NzQiLCAibm9uY2UiOiAieUQyRWh5YzJxa1dtMkxZLUd5QTl1RjEtbGNDQVZKNS1obzNtRkFmYXBKN0YxRmFzRzUwIiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzE0OTA3MzQwODQzIn0", "signature": "cJeN4jN1f7QBg_YJkLFMmf5D17oroa7mzA4Sc6O8ox-BfFqPVFIoLu_g7oglKpgXK2PnGsviAGyPo80A09kZlWwkTUDDf-62e0ehj2ZbGfU-EoUEotE2_exvohSRDp87ANw1dwDG-LRW25wlcIokeLcz8W42_Pi9DRzv6gvcs0cQhqgpFT25GqBEXmE8at_DdZzcmC0KeneLTNobpe4e_r6i3d_zhDWEos38cYJ8rLErS0zB0kUJS6swpLu1ls2pzDczvVPP6vYHxS0aVuT6lFephJcL2tgFCXyh0ioxq_UFMB_CFdbpZ-wv0fNsVctW5g5eQapzY7Fp2ubG6Y2hng", "payload": "" } 2024-11-14 10:31:27,161:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/14907340843 HTTP/1.1" 200 829 2024-11-14 10:31:27,162:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 10:31:27 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 144748474 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5taWkFMt8vRtGjKv56nt26Y1gFR4p9rc0AbiZ4zBSIRQ7J61Pm4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "pending", "expires": "2024-11-21T10:31:26Z", "challenges": [ { "type": "dns-01", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/14907340843/UnhrAg", "status": "pending", "token": "w5HfAHaFsYVjMUAT9769dMPQ2s1Dhr9uVbQs898lEMA" }, { "type": "tls-alpn-01", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/14907340843/eOTbgA", "status": "pending", "token": "w5HfAHaFsYVjMUAT9769dMPQ2s1Dhr9uVbQs898lEMA" }, { "type": "http-01", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/14907340843/VWhaVg", "status": "pending", "token": "w5HfAHaFsYVjMUAT9769dMPQ2s1Dhr9uVbQs898lEMA" } ] } 2024-11-14 10:31:27,163:DEBUG:acme.client:Storing nonce: 5taWkFMt8vRtGjKv56nt26Y1gFR4p9rc0AbiZ4zBSIRQ7J61Pm4 2024-11-14 10:31:27,164:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 10:31:27,164:INFO:certbot._internal.auth_handler:http-01 challenge for scraping.slassurances.fr 2024-11-14 10:31:27,165:INFO:certbot._internal.plugins.webroot:Using the webroot path /usr/share/nginx/html/letsencrypt for all unmatched domains. 2024-11-14 10:31:27,165:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge 2024-11-14 10:31:27,168:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/w5HfAHaFsYVjMUAT9769dMPQ2s1Dhr9uVbQs898lEMA 2024-11-14 10:31:27,169:DEBUG:acme.client:JWS payload: b'{}' 2024-11-14 10:31:27,173:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/14907340843/VWhaVg: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8xNDQ3NDg0NzQiLCAibm9uY2UiOiAiNXRhV2tGTXQ4dlJ0R2pLdjU2bnQyNlkxZ0ZSNHA5cmMwQWJpWjR6QlNJUlE3SjYxUG00IiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzE0OTA3MzQwODQzL1ZXaGFWZyJ9", "signature": "fUbKk8HiriCPWF8ogFsI0vtJASxiR4AZE1CLyE4QizQ-22wEGx0UAdiPQ-GiI5fNZPMKVA2LcxkvNSxhPmWCyc3ISYp0s1j3Ift7A2hWNv2Dio8T9kPR1JRaDWnNuR6Y8KwwWeqivQGrCG4ALacweRc9WhkfA5ZYjUoFh3O09ofh_HavjJ-kH0NRQGE0b-JHKRsJwae2zynDNuBxX7O5N6I_dkODCbWcDbP4CVNFro7_qExca8SeraqjaUByz4t3i5Jtcmv-O09WYlH4sOBJsDks7_kZwHoI7iYsRzzrDKTajDyfmVKd8-nEFjIxl--POkyCe7UGQFJikjtBI76sKw", "payload": "e30" } 2024-11-14 10:31:27,321:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/14907340843/VWhaVg HTTP/1.1" 200 194 2024-11-14 10:31:27,322:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 10:31:27 GMT Content-Type: application/json Content-Length: 194 Connection: keep-alive Boulder-Requester: 144748474 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/14907340843/VWhaVg Replay-Nonce: 5taWkFMtToc2n2CggdxQNFfhCZh74hsg7Nk77dYz45lVYEedMqg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/14907340843/VWhaVg", "status": "pending", "token": "w5HfAHaFsYVjMUAT9769dMPQ2s1Dhr9uVbQs898lEMA" } 2024-11-14 10:31:27,322:DEBUG:acme.client:Storing nonce: 5taWkFMtToc2n2CggdxQNFfhCZh74hsg7Nk77dYz45lVYEedMqg 2024-11-14 10:31:27,323:INFO:certbot._internal.auth_handler:Waiting for verification... 2024-11-14 10:31:28,323:DEBUG:acme.client:JWS payload: b'' 2024-11-14 10:31:28,328:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/14907340843: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8xNDQ3NDg0NzQiLCAibm9uY2UiOiAiNXRhV2tGTXRUb2MybjJDZ2dkeFFORmZoQ1poNzRoc2c3Tms3N2RZejQ1bFZZRWVkTXFnIiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzE0OTA3MzQwODQzIn0", "signature": "jxiYHRfVi-Gu3lAG8gK-n47DkmQVVWVnEd53cC_NvNEROIRu57hG99EslnJGjkWLetp0H18nW-uNrQu10a2Qh3RSfMv6GmgohmuiEfhihJm0IXBz58IRQamvK3K686xl2Oq5AFnvog03dhHGoc_56c-plfjKqpzRmH7iipQvUYCQz8kN0tnnuHijyzrkcxKZcwdLOdOw-kpKlC-Wi6GRoWBNWCqUdQJRYst4TBbmlDppdsf8rVXFjm6KVYxZf-od0RN3xmPaZ0VrRZ7eYERKEoN3q9hEY3kxdO7cCF7vxzYi8mBGBzxmkYL24-lRDwKO91yISb0Ahd3CHWa2sw7Heg", "payload": "" } 2024-11-14 10:31:28,473:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/14907340843 HTTP/1.1" 200 1071 2024-11-14 10:31:28,474:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 10:31:28 GMT Content-Type: application/json Content-Length: 1071 Connection: keep-alive Boulder-Requester: 144748474 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: yD2Ehyc2ywCCuZHRLhIyj_qsVRwl2EHbTYU4lyY1vUa0FP7xpy8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "invalid", "expires": "2024-11-21T10:31:26Z", "challenges": [ { "type": "http-01", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/14907340843/VWhaVg", "status": "invalid", "validated": "2024-11-14T10:31:27Z", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "51.255.71.144: Fetching http://scraping.slassurances.fr/.well-known/acme-challenge/w5HfAHaFsYVjMUAT9769dMPQ2s1Dhr9uVbQs898lEMA: Connection refused", "status": 400 }, "token": "w5HfAHaFsYVjMUAT9769dMPQ2s1Dhr9uVbQs898lEMA", "validationRecord": [ { "url": "http://scraping.slassurances.fr/.well-known/acme-challenge/w5HfAHaFsYVjMUAT9769dMPQ2s1Dhr9uVbQs898lEMA", "hostname": "scraping.slassurances.fr", "port": "80", "addressesResolved": [ "51.255.71.144" ], "addressUsed": "51.255.71.144" } ] } ] } 2024-11-14 10:31:28,474:DEBUG:acme.client:Storing nonce: yD2Ehyc2ywCCuZHRLhIyj_qsVRwl2EHbTYU4lyY1vUa0FP7xpy8 2024-11-14 10:31:28,475:INFO:certbot._internal.auth_handler:Challenge failed for domain scraping.slassurances.fr 2024-11-14 10:31:28,475:INFO:certbot._internal.auth_handler:http-01 challenge for scraping.slassurances.fr 2024-11-14 10:31:28,476:DEBUG:certbot._internal.display.obj:Notifying user: Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems: Domain: scraping.slassurances.fr Type: connection Detail: 51.255.71.144: Fetching http://scraping.slassurances.fr/.well-known/acme-challenge/w5HfAHaFsYVjMUAT9769dMPQ2s1Dhr9uVbQs898lEMA: Connection refused Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet. 2024-11-14 10:31:28,478:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort) File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-11-14 10:31:28,479:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 10:31:28,479:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 10:31:28,479:DEBUG:certbot._internal.plugins.webroot:Removing /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/w5HfAHaFsYVjMUAT9769dMPQ2s1Dhr9uVbQs898lEMA 2024-11-14 10:31:28,480:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up 2024-11-14 10:31:28,481:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/local/bin/certbot", line 33, in sys.exit(load_entry_point('certbot', 'console_scripts', 'certbot')()) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/main.py", line 19, in main return internal_main.main(cli_args) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1876, in main return config.func(config, plugins) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1578, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 142, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 517, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 428, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 496, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort) File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-11-14 10:31:28,488:ERROR:certbot._internal.log:Some challenges have failed.