2024-11-13 16:43:07,615:DEBUG:certbot._internal.main:certbot version: 2.11.0 2024-11-13 16:43:07,616:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/local/bin/certbot 2024-11-13 16:43:07,616:DEBUG:certbot._internal.main:Arguments: ['--webroot', '--webroot-path=/usr/share/nginx/html/letsencrypt', '--email', 'najia@slc-assurances.fr', '--agree-tos', '--no-eff-email', '-d', 'scraping.slassurances.fr'] 2024-11-13 16:43:07,616:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-13 16:43:07,635:DEBUG:certbot._internal.log:Root logging level set at 30 2024-11-13 16:43:07,636:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None 2024-11-13 16:43:07,636:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot Description: Saves the necessary validation files to a .well-known/acme-challenge/ directory within the nominated webroot path. A seperate HTTP server must be running and serving files from the webroot path. HTTP challenge only (wildcards not supported). Interfaces: Authenticator, Plugin Entry point: EntryPoint(name='webroot', value='certbot._internal.plugins.webroot:Authenticator', group='certbot.plugins') Initialized: Prep: True 2024-11-13 16:43:07,636:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-13 16:43:07,637:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None 2024-11-13 16:43:07,710:DEBUG:certbot._internal.main:Picked account: ), creation_host='d75572c010e1', register_to_eff=None))> 2024-11-13 16:43:07,711:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-13 16:43:07,713:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-13 16:43:08,124:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-13 16:43:08,125:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 13 Nov 2024 16:43:08 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QW8DJjAs1fg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-13 16:43:08,136:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for scraping.slassurances.fr 2024-11-13 16:43:08,139:DEBUG:acme.client:Requesting fresh nonce 2024-11-13 16:43:08,139:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-13 16:43:08,276:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-13 16:43:08,277:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 13 Nov 2024 16:43:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SEOe4Whp95tkR_HHAU7JAjmM5HTGtvIXDxXVpCdMqOfjbCJ-g2w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-13 16:43:08,278:DEBUG:acme.client:Storing nonce: SEOe4Whp95tkR_HHAU7JAjmM5HTGtvIXDxXVpCdMqOfjbCJ-g2w 2024-11-13 16:43:08,278:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "scraping.slassurances.fr"\n }\n ]\n}' 2024-11-13 16:43:08,285:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJTRU9lNFdocDk1dGtSX0hIQVU3SkFqbU01SFRHdHZJWER4WFZwQ2RNcU9mamJDSi1nMnciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "ge0uWhue15onJX_N8ZyOgZdzz8SO8Fxk3YiQYqEfEtTzJRbCJrmGnygxixBBvpxPLH4vpNhRcS1zUJkk-MwzQf7erCn3bQrh9ciRd1PurrHlIHIubCFCyCGw8X-AZUWiBAi8Ew7nDOaLx7lC_3IWlub1iiAFl79ZhYekI8IK2yv9b5U2JGYJdaNadFQA0gycJT1kcNFGMdgPQVtwgFgSgwBdqyUEWF2FUxlIUh3IvfzPqq0IEkEuv5VPerFrUDJRldNTxo6KMeXtLX9P4eZMrehlSOa5cjSWa1owtUmXfb7AV3MomdVAyQxrcNIH3WNvpEDGOqrFbv-2Uo-Wv1oIEQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNjcmFwaW5nLnNsYXNzdXJhbmNlcy5mciIKICAgIH0KICBdCn0" } 2024-11-13 16:43:08,627:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-13 16:43:08,629:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 13 Nov 2024 16:43:08 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1673405107/322767589067 Replay-Nonce: qZ7aiiUHG-uTwINKBCMD1FP2NdbMqXj4S9lvKFquzMwMYgXmhsc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-20T16:43:08Z", "identifiers": [ { "type": "dns", "value": "scraping.slassurances.fr" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429640961467" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1673405107/322767589067" } 2024-11-13 16:43:08,629:DEBUG:acme.client:Storing nonce: qZ7aiiUHG-uTwINKBCMD1FP2NdbMqXj4S9lvKFquzMwMYgXmhsc 2024-11-13 16:43:08,630:DEBUG:acme.client:JWS payload: b'' 2024-11-13 16:43:08,634:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429640961467: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJxWjdhaWlVSEctdVR3SU5LQkNNRDFGUDJOZGJNcVhqNFM5bHZLRnF1ek13TVlnWG1oc2MiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQyOTY0MDk2MTQ2NyJ9", "signature": "M6P0-WluyhzgCX34nV0S-Dll4o7IQoxJmtxzb6YIDXjIcXM2gb_WMc0nHTnUAlFvR8Mdmutf4zBHw2qUmNKfN16Cce1rCrJPz0PHepQhC8x_tUvjJrOZSXCD1TyCzDiWaJ7usZge9J9N8kLV60pOLQ1tTFpMl_JURGVoMlAAUNAiUGkdddBNhAi_qjfA91h-ZNqetYnDTxchqHPxsimaX2xiLh7STM0g1r1JbuGcK-lhB5AOrDxlH3A4Kfu9yZybjPPnlEN0dAwqHu1h8H7fTp82Njg6eZ0PDe2pSM44a5vALKlERSfYFvQmF-7sBMwzRd-AwFAwlrZtSwbWF8sc5A", "payload": "" } 2024-11-13 16:43:08,785:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429640961467 HTTP/1.1" 200 808 2024-11-13 16:43:08,786:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 13 Nov 2024 16:43:08 GMT Content-Type: application/json Content-Length: 808 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qZ7aiiUHc7x6oLDruNXFf0uFQpADI1Cr2NZABimn3At60I7ZKAs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "pending", "expires": "2024-11-20T16:43:08Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640961467/NK7F3A", "status": "pending", "token": "hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640961467/dTMcQg", "status": "pending", "token": "hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640961467/fAr0Qg", "status": "pending", "token": "hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g" } ] } 2024-11-13 16:43:08,787:DEBUG:acme.client:Storing nonce: qZ7aiiUHc7x6oLDruNXFf0uFQpADI1Cr2NZABimn3At60I7ZKAs 2024-11-13 16:43:08,788:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-13 16:43:08,788:INFO:certbot._internal.auth_handler:http-01 challenge for scraping.slassurances.fr 2024-11-13 16:43:08,789:INFO:certbot._internal.plugins.webroot:Using the webroot path /usr/share/nginx/html/letsencrypt for all unmatched domains. 2024-11-13 16:43:08,789:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge 2024-11-13 16:43:08,792:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g 2024-11-13 16:43:08,793:DEBUG:acme.client:JWS payload: b'{}' 2024-11-13 16:43:08,797:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640961467/dTMcQg: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJxWjdhaWlVSGM3eDZvTERydU5YRmYwdUZRcEFESTFDcjJOWkFCaW1uM0F0NjBJN1pLQXMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzQyOTY0MDk2MTQ2Ny9kVE1jUWcifQ", "signature": "OmBrY1NoVFcHGH12g8pJ5eZBVU0D9bu1T7f6NF6xgCtYCogJa3pa0A3ULwl9brVshkWyjrH-I4uwVIJexiOTnghUv7bwHHx0x0BjEbEy6pgua3h9iQxTXI2i5ipGEiJ1E8igNJV0lV5H3amJ7UZSS_X5gWkayCoGKPU2YQfi2Bfh7iR4zGBIY5XjtgetuymKX4LoFrIMGM_ooIggOImudZ2koIJUAV9-imqLNCDV8ZBTU7Idpr9l99q4k4iX8r1KW55z03efpzRicx9mcj5dhygQqOSRLtLIEj_SW9Smk8-poRJdLDrfuyaLkIzu5jbtj6sosLQwLZDdgnOih6LAAg", "payload": "e30" } 2024-11-13 16:43:08,954:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/429640961467/dTMcQg HTTP/1.1" 200 187 2024-11-13 16:43:08,955:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 13 Nov 2024 16:43:08 GMT Content-Type: application/json Content-Length: 187 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640961467/dTMcQg Replay-Nonce: SEOe4Whp0gMnBukYdUQh5hp0_RkYmsG8eRYMWL-I0ov2XMI8sZg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640961467/dTMcQg", "status": "pending", "token": "hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g" } 2024-11-13 16:43:08,955:DEBUG:acme.client:Storing nonce: SEOe4Whp0gMnBukYdUQh5hp0_RkYmsG8eRYMWL-I0ov2XMI8sZg 2024-11-13 16:43:08,956:INFO:certbot._internal.auth_handler:Waiting for verification... 2024-11-13 16:43:09,957:DEBUG:acme.client:JWS payload: b'' 2024-11-13 16:43:09,961:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429640961467: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJTRU9lNFdocDBnTW5CdWtZZFVRaDVocDBfUmtZbXNHOGVSWU1XTC1JMG92MlhNSThzWmciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQyOTY0MDk2MTQ2NyJ9", "signature": "aktw4dF5lX7AmzOHWUxxtCZm5SwQVG_k3TL-frcss7BfBT5KH0c955_A6s2sADZdHvMWqMAio2OgDBr81vP7MsLiajZXR322RYE8KjfS2T8ka0pQZwr_BzJwG6R9ybMSlE4Xzz2K22xruH0cRcdq3FNKOW-xBo8lf4lyXqKv7orSF-JPYsCMJr76A_pY4WZphR3UQFZi4hJEH0csWGxb64Bsyze5myRuUqJyXIipk8DRSdKR1jJDsd0GmkRixlttNFnuuTe6IeUbRpcJ4xZoNspHAC8CDXT9SvPu4u54nFO1DoRn8zeU6CWo_QIDLuMan2PiY_0NKLGbedeNQ1E42A", "payload": "" } 2024-11-13 16:43:10,104:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429640961467 HTTP/1.1" 200 808 2024-11-13 16:43:10,105:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 13 Nov 2024 16:43:10 GMT Content-Type: application/json Content-Length: 808 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SEOe4WhpFqrGedwZQu8D3zMlGo69_1Taom6yPExXR7XzEzgbrpw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "pending", "expires": "2024-11-20T16:43:08Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640961467/NK7F3A", "status": "pending", "token": "hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640961467/dTMcQg", "status": "pending", "token": "hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640961467/fAr0Qg", "status": "pending", "token": "hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g" } ] } 2024-11-13 16:43:10,105:DEBUG:acme.client:Storing nonce: SEOe4WhpFqrGedwZQu8D3zMlGo69_1Taom6yPExXR7XzEzgbrpw 2024-11-13 16:43:13,106:DEBUG:acme.client:JWS payload: b'' 2024-11-13 16:43:13,111:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429640961467: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJTRU9lNFdocEZxckdlZHdaUXU4RDN6TWxHbzY5XzFUYW9tNnlQRXhYUjdYekV6Z2JycHciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQyOTY0MDk2MTQ2NyJ9", "signature": "N7xCukvLl9k8d5Qh2v9685kIMUOAdeReKej2RdQP4U4A8N4QNGR98EkgH0dkAx3KaZneoKvtEDFEYbG2DSgnGstCYiP3EFWD_XzHv6P-VGg6mMMcxgDGsFGDN8AjTiNn0qZ7IiqwugaycbR0urms_7-Pf9WJcB6XLBmluXm6OYSeDWGcO_FngkF9gsZpCDKLP6W6KuEmC2ObS1brTqVgaqtxp1yDDz3LuWdP5jVC7rB620GD_RUQ6tcCRBJZ_usetBWXhMOH9OGGeJ0j5ZT8aX_imvWCP1tPQIq_4M2Se5Ljyq6vL7Uf5T1weDH-2BBWuJ0KllEfmKOZ3dvsTgIcLw", "payload": "" } 2024-11-13 16:43:13,252:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429640961467 HTTP/1.1" 200 1636 2024-11-13 16:43:13,254:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 13 Nov 2024 16:43:13 GMT Content-Type: application/json Content-Length: 1636 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SEOe4Whpcbb3gTe1vdnZk2FRakC6CyW-qiJuCpIbE0F36RJ_SWk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "invalid", "expires": "2024-11-20T16:43:08Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640961467/dTMcQg", "status": "invalid", "validated": "2024-11-13T16:43:08Z", "error": { "type": "urn:ietf:params:acme:error:unauthorized", "detail": "51.255.71.144: Invalid response from https://comparateur.slc-assurances.fr/.well-known/acme-challenge/hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g: \"\u003c!DOCTYPE html\u003e\u003chtml lang=\\\"fr\\\"\u003e\u003chead\u003e\u003cmeta http-equiv=\\\"Cache-control\\\" content=\\\"public\\\"\u003e\\n\\n\\n \u003cmeta charset=\\\"utf-8\\\"\u003e\\n \u003ctitle\u003eDevi\"", "status": 403 }, "token": "hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g", "validationRecord": [ { "url": "http://scraping.slassurances.fr/.well-known/acme-challenge/hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g", "hostname": "scraping.slassurances.fr", "port": "80", "addressesResolved": [ "51.255.71.144" ], "addressUsed": "51.255.71.144" }, { "url": "https://comparateur.slc-assurances.fr/.well-known/acme-challenge/hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g", "hostname": "comparateur.slc-assurances.fr", "port": "443", "addressesResolved": [ "51.255.71.144" ], "addressUsed": "51.255.71.144" } ] } ] } 2024-11-13 16:43:13,254:DEBUG:acme.client:Storing nonce: SEOe4Whpcbb3gTe1vdnZk2FRakC6CyW-qiJuCpIbE0F36RJ_SWk 2024-11-13 16:43:13,255:INFO:certbot._internal.auth_handler:Challenge failed for domain scraping.slassurances.fr 2024-11-13 16:43:13,255:INFO:certbot._internal.auth_handler:http-01 challenge for scraping.slassurances.fr 2024-11-13 16:43:13,256:DEBUG:certbot._internal.display.obj:Notifying user: Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems: Domain: scraping.slassurances.fr Type: unauthorized Detail: 51.255.71.144: Invalid response from https://comparateur.slc-assurances.fr/.well-known/acme-challenge/hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g: "\n\n\n \n Devi" Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet. 2024-11-13 16:43:13,258:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort) File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-11-13 16:43:13,259:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-13 16:43:13,259:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-13 16:43:13,259:DEBUG:certbot._internal.plugins.webroot:Removing /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/hjsuP3KSOyv0kNS1eaG9aoV0QoQU9a0t-KvA_M3hD1g 2024-11-13 16:43:13,260:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up 2024-11-13 16:43:13,260:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/local/bin/certbot", line 33, in <module> sys.exit(load_entry_point('certbot', 'console_scripts', 'certbot')()) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/main.py", line 19, in main return internal_main.main(cli_args) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1894, in main return config.func(config, plugins) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1600, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 143, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 517, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 428, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 496, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort) File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-11-13 16:43:13,267:ERROR:certbot._internal.log:Some challenges have failed.