2024-11-14 09:14:59,241:DEBUG:certbot._internal.main:certbot version: 3.0.0 2024-11-14 09:14:59,241:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/local/bin/certbot 2024-11-14 09:14:59,241:DEBUG:certbot._internal.main:Arguments: ['--webroot', '--webroot-path=/usr/share/nginx/html/letsencrypt', '--email', 'najia@slc-assurances.fr', '--agree-tos', '--no-eff-email', '-d', 'scraping.slassurances.fr'] 2024-11-14 09:14:59,242:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-14 09:14:59,261:DEBUG:certbot._internal.log:Root logging level set at 30 2024-11-14 09:14:59,263:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None 2024-11-14 09:14:59,263:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot Description: Saves the necessary validation files to a .well-known/acme-challenge/ directory within the nominated webroot path. A separate HTTP server must be running and serving files from the webroot path. HTTP challenge only (wildcards not supported). Interfaces: Authenticator, Plugin Entry point: EntryPoint(name='webroot', value='certbot._internal.plugins.webroot:Authenticator', group='certbot.plugins') Initialized: Prep: True 2024-11-14 09:14:59,263:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 09:14:59,264:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None 2024-11-14 09:14:59,334:DEBUG:certbot._internal.main:Picked account: ), creation_host='d75572c010e1', register_to_eff=None))> 2024-11-14 09:14:59,335:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 09:14:59,337:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 09:15:01,399:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 09:15:01,400:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 09:15:01 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "J6Rl9QqcZys": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 09:15:01,412:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for scraping.slassurances.fr 2024-11-14 09:15:01,415:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 09:15:01,415:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 09:15:01,556:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 09:15:01,557:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 09:15:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcV0n-zVmcEKo2bJlAGk0GdyA6zYGxK7DRZUA4OUGm251Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 09:15:01,558:DEBUG:acme.client:Storing nonce: aHUr_lcV0n-zVmcEKo2bJlAGk0GdyA6zYGxK7DRZUA4OUGm251Y 2024-11-14 09:15:01,558:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "scraping.slassurances.fr"\n }\n ]\n}' 2024-11-14 09:15:01,565:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJhSFVyX2xjVjBuLXpWbWNFS28yYkpsQUdrMEdkeUE2ellHeEs3RFJaVUE0T1VHbTI1MVkiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "hNBL2u-WEPrFfcy1a8eMfouCjtl_OjoZZBekD2zHuMeukAtcaUyREQsm8IwBH0tmaMyekMKR8ijn_Vbt1dvG-wdqGkGAv3dyoIsZM9kpKH8JLyodesb5TJiW7UhfyR7NTYP0gcl-TXmqsHrIEDYNKXAHMkFoAACmyJwMOSQK_RaP2nG5oWX1Gx6Tusoo9AeLb2ckrlXeaUygKSFZToDUh5OFHRcAfY7ma58UWUTrnnz3TjZO_-f4KgFAMoyCtILlUBrGu1mEo6PEwtF72f5yki2QWy11jaM_-fhr1af7bPZuc1zgYRR6tgLBTRieF6VuTS8EjAhu9HRxdsMpYt5iTQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNjcmFwaW5nLnNsYXNzdXJhbmNlcy5mciIKICAgIH0KICBdCn0" } 2024-11-14 09:15:01,760:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-14 09:15:01,762:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 09:15:01 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1673405107/322992594477 Replay-Nonce: aHUr_lcV14vzU9yP5ZRuOockPdEKFAuTjBzoPf_-GRTs_rhtZ3Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T09:15:01Z", "identifiers": [ { "type": "dns", "value": "scraping.slassurances.fr" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429964044597" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1673405107/322992594477" } 2024-11-14 09:15:01,762:DEBUG:acme.client:Storing nonce: aHUr_lcV14vzU9yP5ZRuOockPdEKFAuTjBzoPf_-GRTs_rhtZ3Q 2024-11-14 09:15:01,763:DEBUG:acme.client:JWS payload: b'' 2024-11-14 09:15:01,767:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429964044597: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJhSFVyX2xjVjE0dnpVOXlQNVpSdU9vY2tQZEVLRkF1VGpCem9QZl8tR1JUc19yaHRaM1EiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQyOTk2NDA0NDU5NyJ9", "signature": "k5rIKeadoChn9CFicfn651TG1yP1D68kSBblZpzoaZpR19c_t-1c3n3GywkWzMX4OaXD459WwZ6B5flQ91AWcDlBtiq8iu7pePq334J4IwvuNR0V4Ga1V7rMluRCJDBQ0fv6RtbKosMfcay0EYv-7hopHKmSC7DhijufMa-7rR3O8TdLLU-ZTbThimp9jzMbPrAT9TB5pv11sC9q3MaNhyjLKR6wP37VQ-X7tzO6vcCKQo-8QWI6zpDKW9CMecynwwyUIiAaU0vXglwiFTFA-mWpD7eRzcjHx3hAehOKDWRzAF67KgqZH8xikSuI3NTqdNWH7NkpW7zu4Z41nfEayQ", "payload": "" } 2024-11-14 09:15:01,915:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429964044597 HTTP/1.1" 200 808 2024-11-14 09:15:01,916:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 09:15:01 GMT Content-Type: application/json Content-Length: 808 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcV-Bwy6rU3tBSBCN-C8NHDGFTllNjjlAXjDhNMFkLa4nY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "pending", "expires": "2024-11-21T09:15:01Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429964044597/q7WdzQ", "status": "pending", "token": "qfY-jR53pL4HaEdw2wfD07JLSze1FuZ91z2jl8rc_Qg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429964044597/lXYdwA", "status": "pending", "token": "qfY-jR53pL4HaEdw2wfD07JLSze1FuZ91z2jl8rc_Qg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429964044597/6SCtfw", "status": "pending", "token": "qfY-jR53pL4HaEdw2wfD07JLSze1FuZ91z2jl8rc_Qg" } ] } 2024-11-14 09:15:01,958:DEBUG:acme.client:Storing nonce: aHUr_lcV-Bwy6rU3tBSBCN-C8NHDGFTllNjjlAXjDhNMFkLa4nY 2024-11-14 09:15:01,959:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 09:15:01,959:INFO:certbot._internal.auth_handler:http-01 challenge for scraping.slassurances.fr 2024-11-14 09:15:01,960:INFO:certbot._internal.plugins.webroot:Using the webroot path /usr/share/nginx/html/letsencrypt for all unmatched domains. 2024-11-14 09:15:01,960:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge 2024-11-14 09:15:01,962:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/qfY-jR53pL4HaEdw2wfD07JLSze1FuZ91z2jl8rc_Qg 2024-11-14 09:15:01,963:DEBUG:acme.client:JWS payload: b'{}' 2024-11-14 09:15:01,966:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/429964044597/lXYdwA: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJhSFVyX2xjVi1Cd3k2clUzdEJTQkNOLUM4TkhER0ZUbGxOampsQVhqRGhOTUZrTGE0blkiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzQyOTk2NDA0NDU5Ny9sWFlkd0EifQ", "signature": "S_Sk3lNt859UNdbmROtiU46jsDc5Psgi-FSQYh0MCmBPOtHiNq_mU2_T68RT-D2QFcRzshFs7wzuH4J6R8xVpWQXfp8Wxj2zeiFXfdXRHHD2pYrI2aY1n3yPSWq9jF-04lT0OnWQuQpgLrLJuPWLiHXf3NZBvYyEqjh--mdzLbu5mdfv3lXS22UKS-jTMGaRMO6wAg5MX7icqWoPGtqOWQzwiTpfSag0idUFem2WMbajZGCwZhidcpMuFeIPeHoKXDe1YPAbR-k9Rv2yXaUt-dFBKRxoWiaTcWDoT3B_1Vqh1w5mDDcT-pOnakmGR2hWRWDGD6clVNG1GxI7pBaixg", "payload": "e30" } 2024-11-14 09:15:02,116:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/429964044597/lXYdwA HTTP/1.1" 200 187 2024-11-14 09:15:02,117:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 09:15:02 GMT Content-Type: application/json Content-Length: 187 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/429964044597/lXYdwA Replay-Nonce: aHUr_lcVtlsNI6y7xCI8EMf3BqEC2eIQeWlCtn4PZkY91xip0EA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429964044597/lXYdwA", "status": "pending", "token": "qfY-jR53pL4HaEdw2wfD07JLSze1FuZ91z2jl8rc_Qg" } 2024-11-14 09:15:02,117:DEBUG:acme.client:Storing nonce: aHUr_lcVtlsNI6y7xCI8EMf3BqEC2eIQeWlCtn4PZkY91xip0EA 2024-11-14 09:15:02,118:INFO:certbot._internal.auth_handler:Waiting for verification... 2024-11-14 09:15:03,119:DEBUG:acme.client:JWS payload: b'' 2024-11-14 09:15:03,123:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429964044597: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJhSFVyX2xjVnRsc05JNnk3eENJOEVNZjNCcUVDMmVJUWVXbEN0bjRQWmtZOTF4aXAwRUEiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQyOTk2NDA0NDU5NyJ9", "signature": "EOD94XuBddsR3-LzfWEDR1fYBJvaTYJpG7iab8K3d8CWWhYqiReWmppnMMV3mOr8qj1lpiri68hqyCVDgd7Iz7Wy2xvzaKbQCvMZ6DV4sCQMHNXYxftOu4BaCqzAmOZneBUXd0i0QuNnY5Fqn_j5MKuR-XQA0nM4RrK1GS99BtbOSKmPHhYw7zDrlFdb7lzjdkNA8O2zEr6FZ6o6bXj7vrLnvJQUAIeh7QkXKa2mXPObtZeDZltigau00ImoZdya2lljVrjbWVEOGCK8FP0Wc3YGI8JWzZY1tcCN1ryxx6WFJCbxveI18HsUGHxgU7N5PHdmfJu1Z558HC4Zo7Z8yw", "payload": "" } 2024-11-14 09:15:03,273:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429964044597 HTTP/1.1" 200 1064 2024-11-14 09:15:03,274:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 09:15:03 GMT Content-Type: application/json Content-Length: 1064 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcVOy-iZaqWX9PH9DTA9KxkpHgIv2XIumoI_yo_wPQEGD0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "invalid", "expires": "2024-11-21T09:15:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429964044597/lXYdwA", "status": "invalid", "validated": "2024-11-14T09:15:02Z", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "51.255.71.144: Fetching http://scraping.slassurances.fr/.well-known/acme-challenge/qfY-jR53pL4HaEdw2wfD07JLSze1FuZ91z2jl8rc_Qg: Connection refused", "status": 400 }, "token": "qfY-jR53pL4HaEdw2wfD07JLSze1FuZ91z2jl8rc_Qg", "validationRecord": [ { "url": "http://scraping.slassurances.fr/.well-known/acme-challenge/qfY-jR53pL4HaEdw2wfD07JLSze1FuZ91z2jl8rc_Qg", "hostname": "scraping.slassurances.fr", "port": "80", "addressesResolved": [ "51.255.71.144" ], "addressUsed": "51.255.71.144" } ] } ] } 2024-11-14 09:15:03,275:DEBUG:acme.client:Storing nonce: aHUr_lcVOy-iZaqWX9PH9DTA9KxkpHgIv2XIumoI_yo_wPQEGD0 2024-11-14 09:15:03,276:INFO:certbot._internal.auth_handler:Challenge failed for domain scraping.slassurances.fr 2024-11-14 09:15:03,276:INFO:certbot._internal.auth_handler:http-01 challenge for scraping.slassurances.fr 2024-11-14 09:15:03,276:DEBUG:certbot._internal.display.obj:Notifying user: Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems: Domain: scraping.slassurances.fr Type: connection Detail: 51.255.71.144: Fetching http://scraping.slassurances.fr/.well-known/acme-challenge/qfY-jR53pL4HaEdw2wfD07JLSze1FuZ91z2jl8rc_Qg: Connection refused Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet. 2024-11-14 09:15:03,279:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort) File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-11-14 09:15:03,279:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 09:15:03,279:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 09:15:03,280:DEBUG:certbot._internal.plugins.webroot:Removing /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/qfY-jR53pL4HaEdw2wfD07JLSze1FuZ91z2jl8rc_Qg 2024-11-14 09:15:03,280:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up 2024-11-14 09:15:03,281:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/local/bin/certbot", line 33, in sys.exit(load_entry_point('certbot', 'console_scripts', 'certbot')()) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/main.py", line 19, in main return internal_main.main(cli_args) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1876, in main return config.func(config, plugins) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1578, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 142, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 517, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 428, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 496, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort) File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-11-14 09:15:03,285:ERROR:certbot._internal.log:Some challenges have failed.