2024-11-13 16:41:16,340:DEBUG:certbot._internal.main:certbot version: 2.11.0 2024-11-13 16:41:16,341:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/local/bin/certbot 2024-11-13 16:41:16,341:DEBUG:certbot._internal.main:Arguments: ['--webroot', '--webroot-path=/usr/share/nginx/html/letsencrypt', '--email', 'najia@slc-assurances.fr', '--agree-tos', '--no-eff-email', '-d', 'scraping.slassurances.fr'] 2024-11-13 16:41:16,341:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-13 16:41:16,360:DEBUG:certbot._internal.log:Root logging level set at 30 2024-11-13 16:41:16,361:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None 2024-11-13 16:41:16,361:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot Description: Saves the necessary validation files to a .well-known/acme-challenge/ directory within the nominated webroot path. A seperate HTTP server must be running and serving files from the webroot path. HTTP challenge only (wildcards not supported). Interfaces: Authenticator, Plugin Entry point: EntryPoint(name='webroot', value='certbot._internal.plugins.webroot:Authenticator', group='certbot.plugins') Initialized: Prep: True 2024-11-13 16:41:16,361:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-13 16:41:16,361:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None 2024-11-13 16:41:16,434:DEBUG:certbot._internal.main:Picked account: ), creation_host='d75572c010e1', register_to_eff=None))> 2024-11-13 16:41:16,435:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-13 16:41:16,437:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-13 16:41:16,862:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-13 16:41:16,863:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 13 Nov 2024 16:41:16 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "q0Fw6-LcnfY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-13 16:41:16,874:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for scraping.slassurances.fr 2024-11-13 16:41:16,877:DEBUG:acme.client:Requesting fresh nonce 2024-11-13 16:41:16,877:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-13 16:41:17,017:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-13 16:41:17,019:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 13 Nov 2024 16:41:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SHEOpopM2Bb-Hjs5aTk9wX2fa2Iajc0KGlkPtbGdQyczjhtvz2g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-13 16:41:17,019:DEBUG:acme.client:Storing nonce: SHEOpopM2Bb-Hjs5aTk9wX2fa2Iajc0KGlkPtbGdQyczjhtvz2g 2024-11-13 16:41:17,020:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "scraping.slassurances.fr"\n }\n ]\n}' 2024-11-13 16:41:17,027:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJTSEVPcG9wTTJCYi1IanM1YVRrOXdYMmZhMklhamMwS0dsa1B0YkdkUXljempodHZ6MmciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "qoGbznM5TM_54cD6rlnNDnpTZPMEblgbLXJ7mSSccUpi-WqqVMiaPDM8hoUxUJS37AxHCKY-6Mh6ofC6fEfPMACdQCdDl-RBXxeuwDCHOGacePa9bEL2qE2XIsEUkVijWpUdVQNWfd_8pzxjPyyI55XxETSVQI4upiHHypKkwTcyGSOLAcMaGKMitkbhdjmqF_zPPHlRKruvyHKTIhlr_ca2W4RNxVpYGSXUvAyi64pNhnpSUmbwcEpqf71D-YKXEJTxVitbjlLxGQhIBg_DJtmcTEhTzzy_JOv37wWFucg7SQIj4hJ9CAstUhVHmJJ998Yfmju5E6XQ-x9_964Kvg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNjcmFwaW5nLnNsYXNzdXJhbmNlcy5mciIKICAgIH0KICBdCn0" } 2024-11-13 16:41:17,208:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-13 16:41:17,209:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 13 Nov 2024 16:41:17 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1673405107/322767195127 Replay-Nonce: SHEOpopMnI-kOWT7qGwSpVSZdjFp5fb6p-kKxcyZcQBxWVuF_u8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-20T16:41:17Z", "identifiers": [ { "type": "dns", "value": "scraping.slassurances.fr" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429640367777" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1673405107/322767195127" } 2024-11-13 16:41:17,210:DEBUG:acme.client:Storing nonce: SHEOpopMnI-kOWT7qGwSpVSZdjFp5fb6p-kKxcyZcQBxWVuF_u8 2024-11-13 16:41:17,210:DEBUG:acme.client:JWS payload: b'' 2024-11-13 16:41:17,213:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429640367777: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJTSEVPcG9wTW5JLWtPV1Q3cUd3U3BWU1pkakZwNWZiNnAta0t4Y3laY1FCeFdWdUZfdTgiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQyOTY0MDM2Nzc3NyJ9", "signature": "T90-oW2CiVcdOOX6Ad7CsHV3FtFQeHyGsyFyJkjV7ONwp1n6CVSX9BTJ3uAbTuKo5DWb2srutWxNhzghYLs1RhqxbnpuUw_xc78LdSuHOnt2cWr3c4HFK6B4lnv1TVm2HNC2an0l_1e2P-xffTIIaVbxRqt9nTvu4LDJT9lkOxmzUGRPdfNAK7R7xoyfxpaaTtFlbhn1LQeNNye-ZkD-6YKxlnzCd6dRMrI5uot138lChNOm37zWPSYzBUVqBsjK-6gPDxrRnkBk1LqDd6-BybHdztWh3ABhghW9vqsizUxKdS-PqWB8h033qyDpfLEphcYIOPZDc7u4-oYt-yys3w", "payload": "" } 2024-11-13 16:41:17,359:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429640367777 HTTP/1.1" 200 808 2024-11-13 16:41:17,360:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 13 Nov 2024 16:41:17 GMT Content-Type: application/json Content-Length: 808 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcVi-53rTYikWisIOn7fQasCJocvqc06C0VwUAMrdIzLpc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "pending", "expires": "2024-11-20T16:41:17Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640367777/G7MzYQ", "status": "pending", "token": "4UmqKOgV1i1UmadXv7P3Rc_Ifiocd46BThh3ZcPPvCw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640367777/E58Hcw", "status": "pending", "token": "4UmqKOgV1i1UmadXv7P3Rc_Ifiocd46BThh3ZcPPvCw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640367777/_nccXA", "status": "pending", "token": "4UmqKOgV1i1UmadXv7P3Rc_Ifiocd46BThh3ZcPPvCw" } ] } 2024-11-13 16:41:17,361:DEBUG:acme.client:Storing nonce: aHUr_lcVi-53rTYikWisIOn7fQasCJocvqc06C0VwUAMrdIzLpc 2024-11-13 16:41:17,362:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-13 16:41:17,362:INFO:certbot._internal.auth_handler:http-01 challenge for scraping.slassurances.fr 2024-11-13 16:41:17,363:INFO:certbot._internal.plugins.webroot:Using the webroot path /usr/share/nginx/html/letsencrypt for all unmatched domains. 2024-11-13 16:41:17,363:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge 2024-11-13 16:41:17,365:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/4UmqKOgV1i1UmadXv7P3Rc_Ifiocd46BThh3ZcPPvCw 2024-11-13 16:41:17,366:DEBUG:acme.client:JWS payload: b'{}' 2024-11-13 16:41:17,370:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640367777/G7MzYQ: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJhSFVyX2xjVmktNTNyVFlpa1dpc0lPbjdmUWFzQ0pvY3ZxYzA2QzBWd1VBTXJkSXpMcGMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzQyOTY0MDM2Nzc3Ny9HN016WVEifQ", "signature": "n08ykTrE_VyXPvbQuM8pbitNCtDqBPE7mKsaqMbLqxhDgYhyO_1NPgVs37loVP98ceo5LNM9QWaJyv9PVuYGEsPiGUXbyai6eoRkSAaHJ8itSCUe6_IJMflG13h7x_GU2Y2_KjsIdEP3bSfB37FHv5-1lUCT09ambdYAgexvyMWRK5UFA46RpQPWpYd_Nnk0m37LsTzhGJMP-AJSlHmYuw_WRwaLuhsYYDM9DQ0ROaG5PQK0vUCfZfMwwpyorA0OadJcsgOkwKPtu9tkrtzfYnZAOBJfer_xE2piRF9Scuxt6Cl_RG2aB42s-CGe9rZ-Um0gYxSAIg5mlZ9xZYDr0A", "payload": "e30" } 2024-11-13 16:41:17,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/429640367777/G7MzYQ HTTP/1.1" 200 187 2024-11-13 16:41:17,521:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 13 Nov 2024 16:41:17 GMT Content-Type: application/json Content-Length: 187 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640367777/G7MzYQ Replay-Nonce: SHEOpopM2b3c4o9h7AxLQZ7D-FvD33Xu2-xps6HP4xedXIwIqfs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640367777/G7MzYQ", "status": "pending", "token": "4UmqKOgV1i1UmadXv7P3Rc_Ifiocd46BThh3ZcPPvCw" } 2024-11-13 16:41:17,521:DEBUG:acme.client:Storing nonce: SHEOpopM2b3c4o9h7AxLQZ7D-FvD33Xu2-xps6HP4xedXIwIqfs 2024-11-13 16:41:17,522:INFO:certbot._internal.auth_handler:Waiting for verification... 2024-11-13 16:41:18,522:DEBUG:acme.client:JWS payload: b'' 2024-11-13 16:41:18,527:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429640367777: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJTSEVPcG9wTTJiM2M0bzloN0F4TFFaN0QtRnZEMzNYdTIteHBzNkhQNHhlZFhJd0lxZnMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQyOTY0MDM2Nzc3NyJ9", "signature": "hft1HehVYEiu7JXC_lsEjVGxLxckAMJSkl_N7yvwxUBKaYDj3XSbHwgZhhqV-0F94V5mb7CFou3wfcNrDwdOTKO7cr6AVX3WpjV-iZypL-jsPghFRE9GNMF2VGS85kJcdOE9PUV8KlWvuLoKU-ratOdYCNcQUFml_NXXiPikft3vUJb0TXvb8-AfVOHYLzE5WAAi_tFdDwu4gqr_5Gj-kWNF3619QAkWpVuQsVvt6II3DfMoWeRPuhgQVjnf39ogn-kUNQoorMIj5LSDyFGnii7GR03b3zzo3oL41h4Lyy_Fb2Y1A-zKx3ecr4aYzlNLKUHEPVZhE2aODvYu2PsERg", "payload": "" } 2024-11-13 16:41:18,674:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429640367777 HTTP/1.1" 200 1064 2024-11-13 16:41:18,675:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 13 Nov 2024 16:41:18 GMT Content-Type: application/json Content-Length: 1064 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SHEOpopM3ZikCNbfQAM4M55EzyrcpHrqMddZWEOHpNg_k-IvAHc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "invalid", "expires": "2024-11-20T16:41:17Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429640367777/G7MzYQ", "status": "invalid", "validated": "2024-11-13T16:41:17Z", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "51.255.71.144: Fetching http://scraping.slassurances.fr/.well-known/acme-challenge/4UmqKOgV1i1UmadXv7P3Rc_Ifiocd46BThh3ZcPPvCw: Connection refused", "status": 400 }, "token": "4UmqKOgV1i1UmadXv7P3Rc_Ifiocd46BThh3ZcPPvCw", "validationRecord": [ { "url": "http://scraping.slassurances.fr/.well-known/acme-challenge/4UmqKOgV1i1UmadXv7P3Rc_Ifiocd46BThh3ZcPPvCw", "hostname": "scraping.slassurances.fr", "port": "80", "addressesResolved": [ "51.255.71.144" ], "addressUsed": "51.255.71.144" } ] } ] } 2024-11-13 16:41:18,676:DEBUG:acme.client:Storing nonce: SHEOpopM3ZikCNbfQAM4M55EzyrcpHrqMddZWEOHpNg_k-IvAHc 2024-11-13 16:41:18,676:INFO:certbot._internal.auth_handler:Challenge failed for domain scraping.slassurances.fr 2024-11-13 16:41:18,677:INFO:certbot._internal.auth_handler:http-01 challenge for scraping.slassurances.fr 2024-11-13 16:41:18,677:DEBUG:certbot._internal.display.obj:Notifying user: Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems: Domain: scraping.slassurances.fr Type: connection Detail: 51.255.71.144: Fetching http://scraping.slassurances.fr/.well-known/acme-challenge/4UmqKOgV1i1UmadXv7P3Rc_Ifiocd46BThh3ZcPPvCw: Connection refused Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet. 2024-11-13 16:41:18,680:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort) File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-11-13 16:41:18,680:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-13 16:41:18,680:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-13 16:41:18,680:DEBUG:certbot._internal.plugins.webroot:Removing /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/4UmqKOgV1i1UmadXv7P3Rc_Ifiocd46BThh3ZcPPvCw 2024-11-13 16:41:18,681:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up 2024-11-13 16:41:18,682:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/local/bin/certbot", line 33, in sys.exit(load_entry_point('certbot', 'console_scripts', 'certbot')()) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/main.py", line 19, in main return internal_main.main(cli_args) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1894, in main return config.func(config, plugins) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1600, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 143, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 517, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 428, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 496, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort) File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-11-13 16:41:18,688:ERROR:certbot._internal.log:Some challenges have failed.