HEX
Server: Apache
System: Linux cloud.webdesigntm.online 4.18.0-477.10.1.el8_8.x86_64 #1 SMP Tue May 16 07:35:04 EDT 2023 x86_64
User: imperoro (1004)
PHP: 8.0.30
Disabled: exec,passthru,shell_exec,system
Upload Files
File: //var/log/letsencrypt/letsencrypt.log.72
2026-02-04 07:01:59,192:DEBUG:certbot._internal.main:certbot version: 1.22.0
2026-02-04 07:01:59,194:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot
2026-02-04 07:01:59,194:DEBUG:certbot._internal.main:Arguments: ['--noninteractive', '--no-random-sleep-on-renew']
2026-02-04 07:01:59,194:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2026-02-04 07:01:59,291:DEBUG:certbot._internal.log:Root logging level set at 30
2026-02-04 07:01:59,297:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/cloud.webdesigntm.online.conf
2026-02-04 07:01:59,323:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x7efea126f128> and installer <certbot._internal.cli.cli_utils._Default object at 0x7efea126f128>
2026-02-04 07:01:59,358:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-04-10 11:27:05 UTC.
2026-02-04 07:01:59,358:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing...
2026-02-04 07:01:59,358:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None
2026-02-04 07:01:59,362:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot
Description: Place files in webroot directory
Interfaces: Authenticator, Plugin
Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x7efea1215c18>
Prep: True
2026-02-04 07:01:59,363:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.webroot.Authenticator object at 0x7efea1215c18> and installer None
2026-02-04 07:01:59,364:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None
2026-02-04 07:01:59,380:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/998163537', new_authzr_uri=None, terms_of_service=None), ae859f800d1e94bed209d1184ebf3767, Meta(creation_dt=datetime.datetime(2023, 3, 7, 13, 37, 9, tzinfo=<UTC>), creation_host='cloud.webdesigntm.online', register_to_eff=None))>
2026-02-04 07:01:59,383:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2026-02-04 07:01:59,386:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2026-02-04 07:01:59,805:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 1033
2026-02-04 07:01:59,807:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 04 Feb 2026 07:01:59 GMT
Content-Type: application/json
Content-Length: 1033
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "https://letsencrypt.org/docs/profiles#classic",
      "shortlived": "https://letsencrypt.org/docs/profiles#shortlived",
      "tlsclient": "https://letsencrypt.org/docs/profiles#tlsclient",
      "tlsserver": "https://letsencrypt.org/docs/profiles#tlsserver"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.6-August-18-2025.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/acme/renewal-info",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "utC1cHpkruw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2026-02-04 07:01:59,809:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for cloud.webdesigntm.online
2026-02-04 07:01:59,931:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/1456_key-certbot.pem
2026-02-04 07:01:59,976:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/1456_csr-certbot.pem
2026-02-04 07:01:59,977:DEBUG:acme.client:Requesting fresh nonce
2026-02-04 07:01:59,978:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2026-02-04 07:02:00,114:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2026-02-04 07:02:00,115:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 04 Feb 2026 07:02:00 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: yEIP-nqMRsgwpEsSoz6vcQBv1EjJ9Xzstam8Lo3leo5XEF2m4po
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2026-02-04 07:02:00,116:DEBUG:acme.client:Storing nonce: yEIP-nqMRsgwpEsSoz6vcQBv1EjJ9Xzstam8Lo3leo5XEF2m4po
2026-02-04 07:02:00,117:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "cloud.webdesigntm.online"\n    }\n  ]\n}'
2026-02-04 07:02:00,122:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogInlFSVAtbnFNUnNnd3BFc1NvejZ2Y1FCdjFFako5WHpzdGFtOExvM2xlbzVYRUYybTRwbyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0",
  "signature": "sMu4AW638FTtQ18sBiCboFTAgOPAgq_HdFjLlu2-_BOUwWRneg48rA-CutPaFz1XnS2ZOdady0rmyD8zXLMZdRmgu97Bey0MfLudzsiY5p5l6siLz6yqXuPwwgrzPQhlSYEmsXy_poMpo3mHJIWA4bL0Tk3UaUbe1ypwZ1M0kSYQxC5VIanUpUlj_YJRUO9sp1Bz1Dfa7NBw00W_66WSOkDveaUCKzHgcaRwRT3th3kmiCR7xwm3SbIbjFAhj-5pxWbElVyBwuA4rfI4P-T4T-SyWFM8ymiQz71TnNVBjiTtrbjS_dv5sQgi4Ev7Y4vrR3SWT5K9m_Zacpmvf5sqBg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNsb3VkLndlYmRlc2lnbnRtLm9ubGluZSIKICAgIH0KICBdCn0"
}
2026-02-04 07:02:00,391:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356
2026-02-04 07:02:00,392:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 04 Feb 2026 07:02:00 GMT
Content-Type: application/json
Content-Length: 356
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/998163537/476677380206
Replay-Nonce: ay3RMBSdGg37i5c9zFKdtKV83LnUrx4G4OQ3i1qrWWTIRjfo2pw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2026-02-11T07:02:00Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "cloud.webdesigntm.online"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/998163537/653455220886"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/998163537/476677380206"
}
2026-02-04 07:02:00,392:DEBUG:acme.client:Storing nonce: ay3RMBSdGg37i5c9zFKdtKV83LnUrx4G4OQ3i1qrWWTIRjfo2pw
2026-02-04 07:02:00,393:DEBUG:acme.client:JWS payload:
b''
2026-02-04 07:02:00,395:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/998163537/653455220886:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogImF5M1JNQlNkR2czN2k1Yzl6RktkdEtWODNMblVyeDRHNE9RM2kxcXJXV1RJUmpmbzJwdyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovOTk4MTYzNTM3LzY1MzQ1NTIyMDg4NiJ9",
  "signature": "A0DhYIeRKPy4XCgmargiXuQGgFf7aF1XqEc8nli4zukXz1vcRlYaDb-zDQlxKWLo5LxsB6biDAHwHNjMWYq_YJyGDjmTtpe-SHZ-nEceFbZbboyOF6ux-FOW2_AQPYNxxpFZmkOFiPA6nWmuv5sbfPyvNtMBMJsqtTJHpwB4WO4DoiajC5KwthoAOr5bEBwvzqnoQK-Sb8afS-6nbYz6eV5tzhhs0Rz0dA4dJH-406hLIQDahQbhT2nFlJuj7AgX6FlY6qu5OPxMeN7S3MyD2SkDycA0wN6TnMafS4i2Ri5XoMWx6WXtpiFYdPryhctdKxCJqU0PNBOI3bYmWolY5g",
  "payload": ""
}
2026-02-04 07:02:00,535:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/998163537/653455220886 HTTP/1.1" 200 829
2026-02-04 07:02:00,536:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 04 Feb 2026 07:02:00 GMT
Content-Type: application/json
Content-Length: 829
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: ay3RMBSdi8h-auN8ZWzvJcldneFFJK0SwGjg1ZEN9n8Ue6ffqNk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "cloud.webdesigntm.online"
  },
  "status": "pending",
  "expires": "2026-02-11T07:02:00Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/653455220886/-I_rvg",
      "status": "pending",
      "token": "DLlmUz3gLfAlm9DdHlFAsbVGAgtSVo7l_soePGK2Brs"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/653455220886/TX_NIA",
      "status": "pending",
      "token": "DLlmUz3gLfAlm9DdHlFAsbVGAgtSVo7l_soePGK2Brs"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/653455220886/lTGRiQ",
      "status": "pending",
      "token": "DLlmUz3gLfAlm9DdHlFAsbVGAgtSVo7l_soePGK2Brs"
    }
  ]
}
2026-02-04 07:02:00,536:DEBUG:acme.client:Storing nonce: ay3RMBSdi8h-auN8ZWzvJcldneFFJK0SwGjg1ZEN9n8Ue6ffqNk
2026-02-04 07:02:00,537:INFO:certbot._internal.auth_handler:Performing the following challenges:
2026-02-04 07:02:00,537:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.webdesigntm.online
2026-02-04 07:02:00,538:INFO:certbot._internal.plugins.webroot:Using the webroot path /var/www/html for all unmatched domains.
2026-02-04 07:02:00,538:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /var/www/html/.well-known/acme-challenge
2026-02-04 07:02:00,543:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /var/www/html/.well-known/acme-challenge/DLlmUz3gLfAlm9DdHlFAsbVGAgtSVo7l_soePGK2Brs
2026-02-04 07:02:00,549:DEBUG:acme.client:JWS payload:
b'{}'
2026-02-04 07:02:00,553:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall/998163537/653455220886/-I_rvg:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogImF5M1JNQlNkaThoLWF1TjhaV3p2SmNsZG5lRkZKSzBTd0dqZzFaRU45bjhVZTZmZnFOayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwvOTk4MTYzNTM3LzY1MzQ1NTIyMDg4Ni8tSV9ydmcifQ",
  "signature": "Qr5scKPaR1qwewGnqEVbrzXdFP118ukgCLRD2PLRFLcDFSBJRgZhH5kAxZoYjY9bDIwuHx6nmWr_lwY4XiNcUQf_8Owtnezy40wZL8YRuYWQoC9eIMCLracKypKN7j1C5b7lixTAvyv5VJdb-greZcOb6-8fRNx8P11ay7koBCjI9-xdOIUN9LZCj26JyA7yGjf4eHJX0hPlM3I2P6Z7ejj3Lh6UKbFod5WsqVrpbixSpv-1dvGwgnT8ENCleo1HjQN_1a1hY-ImLp9esKzgljgTCooeIc-YjgAefJJUwgcc9Gr_nuJOXSa0cb2i4gSZJTQ61OK7euh_8oOAlaNZwA",
  "payload": "e30"
}
2026-02-04 07:02:00,693:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall/998163537/653455220886/-I_rvg HTTP/1.1" 200 194
2026-02-04 07:02:00,694:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 04 Feb 2026 07:02:00 GMT
Content-Type: application/json
Content-Length: 194
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz/998163537/653455220886>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall/998163537/653455220886/-I_rvg
Replay-Nonce: ay3RMBSdLWvkpfCPuGi56QquGVEHjU9e8ubLfowIR_AsDSd_V9k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "type": "http-01",
  "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/653455220886/-I_rvg",
  "status": "pending",
  "token": "DLlmUz3gLfAlm9DdHlFAsbVGAgtSVo7l_soePGK2Brs"
}
2026-02-04 07:02:00,694:DEBUG:acme.client:Storing nonce: ay3RMBSdLWvkpfCPuGi56QquGVEHjU9e8ubLfowIR_AsDSd_V9k
2026-02-04 07:02:00,695:INFO:certbot._internal.auth_handler:Waiting for verification...
2026-02-04 07:02:01,696:DEBUG:acme.client:JWS payload:
b''
2026-02-04 07:02:01,700:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/998163537/653455220886:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogImF5M1JNQlNkTFd2a3BmQ1B1R2k1NlFxdUdWRUhqVTllOHViTGZvd0lSX0FzRFNkX1Y5ayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovOTk4MTYzNTM3LzY1MzQ1NTIyMDg4NiJ9",
  "signature": "oQOWBaPUU5-70Rl1ET2KqgIRS7pjhJeYpjmPZh-7hlnV-C2UpSnJ_k7wj9jbtHraAS0GF2r-LEBAxyfYnIYBCKBDb6F3z6NlI184zB9_bftD8KkBlYFlsKSFbK12FYYRF-4ZNxZ-DZiQVlIvc13VhvGkZOXJtXVx3v7SfBBWGboU9CxNMTD7OEv3aYWQsB2B2im5DZCYTt7FIA1bnvNWvhgsnXrixRtCL1VLCE-pijmhLpVuiI9J5UZ8yS6j8Y-VY0WA6r5t5Bg7Wq_XZwV2GS9vDI8x08EKZKdqKq_rT8H_6KWYTXuW4LmNrFgHdZ1VbK8btfdJpByLBaqllqphng",
  "payload": ""
}
2026-02-04 07:02:01,840:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/998163537/653455220886 HTTP/1.1" 200 778
2026-02-04 07:02:01,841:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 04 Feb 2026 07:02:01 GMT
Content-Type: application/json
Content-Length: 778
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: ay3RMBSdC4N6c4tko9CxFodTQoH9EOj_t4diaTTYeEVyNQ9ilEw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "cloud.webdesigntm.online"
  },
  "status": "invalid",
  "expires": "2026-02-11T07:02:00Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/653455220886/-I_rvg",
      "status": "invalid",
      "validated": "2026-02-04T07:02:00Z",
      "error": {
        "type": "urn:ietf:params:acme:error:dns",
        "detail": "DNS problem: NXDOMAIN looking up A for cloud.webdesigntm.online - check that a DNS record exists for this domain; DNS problem: NXDOMAIN looking up AAAA for cloud.webdesigntm.online - check that a DNS record exists for this domain",
        "status": 400
      },
      "token": "DLlmUz3gLfAlm9DdHlFAsbVGAgtSVo7l_soePGK2Brs"
    }
  ]
}
2026-02-04 07:02:01,842:DEBUG:acme.client:Storing nonce: ay3RMBSdC4N6c4tko9CxFodTQoH9EOj_t4diaTTYeEVyNQ9ilEw
2026-02-04 07:02:01,843:INFO:certbot._internal.auth_handler:Challenge failed for domain cloud.webdesigntm.online
2026-02-04 07:02:01,843:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.webdesigntm.online
2026-02-04 07:02:01,843:DEBUG:certbot._internal.display.obj:Notifying user: 
Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
  Domain: cloud.webdesigntm.online
  Type:   dns
  Detail: DNS problem: NXDOMAIN looking up A for cloud.webdesigntm.online - check that a DNS record exists for this domain; DNS problem: NXDOMAIN looking up AAAA for cloud.webdesigntm.online - check that a DNS record exists for this domain

Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.

2026-02-04 07:02:01,846:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations
    self._poll_authorizations(authzrs, max_retries, best_effort)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations
    raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

2026-02-04 07:02:01,846:DEBUG:certbot._internal.error_handler:Calling registered functions
2026-02-04 07:02:01,846:INFO:certbot._internal.auth_handler:Cleaning up challenges
2026-02-04 07:02:01,847:DEBUG:certbot._internal.plugins.webroot:Removing /var/www/html/.well-known/acme-challenge/DLlmUz3gLfAlm9DdHlFAsbVGAgtSVo7l_soePGK2Brs
2026-02-04 07:02:01,847:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up
2026-02-04 07:02:01,848:ERROR:certbot._internal.renewal:Failed to renew certificate cloud.webdesigntm.online with error: Some challenges have failed.
2026-02-04 07:02:01,852:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 485, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1441, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 127, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 345, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 424, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 476, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations
    self._poll_authorizations(authzrs, max_retries, best_effort)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations
    raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

2026-02-04 07:02:01,854:DEBUG:certbot._internal.display.obj:Notifying user: 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2026-02-04 07:02:01,855:ERROR:certbot._internal.renewal:All renewals failed. The following certificates could not be renewed:
2026-02-04 07:02:01,855:ERROR:certbot._internal.renewal:  /etc/letsencrypt/live/cloud.webdesigntm.online/fullchain.pem (failure)
2026-02-04 07:02:01,856:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2026-02-04 07:02:01,856:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "/usr/bin/certbot", line 11, in <module>
    load_entry_point('certbot==1.22.0', 'console_scripts', 'certbot')()
  File "/usr/lib/python3.6/site-packages/certbot/main.py", line 19, in main
    return internal_main.main(cli_args)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1632, in main
    return config.func(config, plugins)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1518, in renew
    renewal.handle_renewal_request(config)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 512, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 1 renew failure(s), 0 parse failure(s)
2026-02-04 07:02:01,857:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)