HEX
Server: Apache
System: Linux cloud.webdesigntm.online 4.18.0-477.10.1.el8_8.x86_64 #1 SMP Tue May 16 07:35:04 EDT 2023 x86_64
User: imperoro (1004)
PHP: 8.0.30
Disabled: exec,passthru,shell_exec,system
Upload Files
File: //var/log/letsencrypt/letsencrypt.log.104
2026-01-19 10:48:56,421:DEBUG:certbot._internal.main:certbot version: 1.22.0
2026-01-19 10:48:56,422:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot
2026-01-19 10:48:56,422:DEBUG:certbot._internal.main:Arguments: ['--noninteractive', '--no-random-sleep-on-renew']
2026-01-19 10:48:56,423:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2026-01-19 10:48:56,506:DEBUG:certbot._internal.log:Root logging level set at 30
2026-01-19 10:48:56,512:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/cloud.webdesigntm.online.conf
2026-01-19 10:48:56,538:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x7f2d7ee18128> and installer <certbot._internal.cli.cli_utils._Default object at 0x7f2d7ee18128>
2026-01-19 10:48:56,575:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-04-10 11:27:05 UTC.
2026-01-19 10:48:56,575:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing...
2026-01-19 10:48:56,575:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None
2026-01-19 10:48:56,579:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot
Description: Place files in webroot directory
Interfaces: Authenticator, Plugin
Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x7f2d7edbec18>
Prep: True
2026-01-19 10:48:56,581:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.webroot.Authenticator object at 0x7f2d7edbec18> and installer None
2026-01-19 10:48:56,581:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None
2026-01-19 10:48:56,591:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/998163537', new_authzr_uri=None, terms_of_service=None), ae859f800d1e94bed209d1184ebf3767, Meta(creation_dt=datetime.datetime(2023, 3, 7, 13, 37, 9, tzinfo=<UTC>), creation_host='cloud.webdesigntm.online', register_to_eff=None))>
2026-01-19 10:48:56,593:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2026-01-19 10:48:56,596:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2026-01-19 10:48:57,029:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 1033
2026-01-19 10:48:57,030:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 19 Jan 2026 10:48:56 GMT
Content-Type: application/json
Content-Length: 1033
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "HC-QS_THXGE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "https://letsencrypt.org/docs/profiles#classic",
      "shortlived": "https://letsencrypt.org/docs/profiles#shortlived",
      "tlsclient": "https://letsencrypt.org/docs/profiles#tlsclient",
      "tlsserver": "https://letsencrypt.org/docs/profiles#tlsserver"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.6-August-18-2025.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/acme/renewal-info",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2026-01-19 10:48:57,032:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for cloud.webdesigntm.online
2026-01-19 10:48:57,251:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/1424_key-certbot.pem
2026-01-19 10:48:57,290:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/1424_csr-certbot.pem
2026-01-19 10:48:57,291:DEBUG:acme.client:Requesting fresh nonce
2026-01-19 10:48:57,292:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2026-01-19 10:48:57,435:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2026-01-19 10:48:57,436:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 19 Jan 2026 10:48:57 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 82ktJIqYknk_-tg3gQ2UYEaGDOBxa0izMCPskdAIsEYcJd4eX9I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2026-01-19 10:48:57,437:DEBUG:acme.client:Storing nonce: 82ktJIqYknk_-tg3gQ2UYEaGDOBxa0izMCPskdAIsEYcJd4eX9I
2026-01-19 10:48:57,437:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "cloud.webdesigntm.online"\n    }\n  ]\n}'
2026-01-19 10:48:57,444:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogIjgya3RKSXFZa25rXy10ZzNnUTJVWUVhR0RPQnhhMGl6TUNQc2tkQUlzRVljSmQ0ZVg5SSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0",
  "signature": "K-I0hydtIs-0q8WpCLU8cglPdZlLRSfkfHCM4d2u_GVo65F0sqPLXpfMeclRwMTGBAiiiBAkB6HFe0xI2HBbCQRQnAvELZ63xjqoWTKIBAzdHzqnEbnNHql0N0EjE8XQP4T8hoI57iBIBv4azspYpgFbgxQ5PffpcYbBhD0Q5yS3Kyh7UAhD2T7L2SiVRtippOesdaSWL4CE9g4ulX2uqwl2CYSCE_c-JekPq5XoTLU1o5RdVs-H5a5Phlpt6j-pyUANrNVOM20dFp8juYUT5eIci2JBHd_vu8IupjwY5lTfjkKQ9-S9EBUgxSFKXRpqPVEVOzYorQ4qBURzsOjfUg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNsb3VkLndlYmRlc2lnbnRtLm9ubGluZSIKICAgIH0KICBdCn0"
}
2026-01-19 10:48:57,622:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356
2026-01-19 10:48:57,623:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 19 Jan 2026 10:48:57 GMT
Content-Type: application/json
Content-Length: 356
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/998163537/471156236686
Replay-Nonce: 82ktJIqYqPYlvZOxfiek9Zqod6NIvST-mPZXcJ3b7EgShzzllgs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2026-01-26T10:48:57Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "cloud.webdesigntm.online"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/998163537/645461108576"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/998163537/471156236686"
}
2026-01-19 10:48:57,623:DEBUG:acme.client:Storing nonce: 82ktJIqYqPYlvZOxfiek9Zqod6NIvST-mPZXcJ3b7EgShzzllgs
2026-01-19 10:48:57,623:DEBUG:acme.client:JWS payload:
b''
2026-01-19 10:48:57,625:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/998163537/645461108576:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogIjgya3RKSXFZcVBZbHZaT3hmaWVrOVpxb2Q2Tkl2U1QtbVBaWGNKM2I3RWdTaHp6bGxncyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovOTk4MTYzNTM3LzY0NTQ2MTEwODU3NiJ9",
  "signature": "AenoKq3tu1teYrmfgUthrDqqUo1Or7sku3x5ns4YAjoiMjDaoh6O0yQ2vUHx13eN5ssCDiD64qJ3QL3x5pAc8y-FJ2nCInitFgSn8H8ikiEfit4dlQ7oDvg745vd0V7A4MvGBK2QaOHzVt-Mwa4f36EaERGcopIPm2KqrrxoB5SnLSwE6Fm_CqOGncseGJIfT5Tsl08bgJzWNNdeVrBAylFyJbTW_YH-_oqgehqtn4lIxHXE95rvs10e6uDNvzAkygTuPL0z9nMbCH-afoG2aqsQU7gO_2IErjMfie6aJd9tEGQCY9zwbImQEl5d15IBptlVWfSgtUbqAkZz-CtMGA",
  "payload": ""
}
2026-01-19 10:48:57,771:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/998163537/645461108576 HTTP/1.1" 200 829
2026-01-19 10:48:57,773:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 19 Jan 2026 10:48:57 GMT
Content-Type: application/json
Content-Length: 829
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: l5FKN_ymPwLPzYkPgjyN77ZVu0O_Fg70TZysUhnTP9mQO6lm1U4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "cloud.webdesigntm.online"
  },
  "status": "pending",
  "expires": "2026-01-26T10:48:57Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/645461108576/r4GIcQ",
      "status": "pending",
      "token": "ETUld9BZDqTwTn3Cd53OKOBurelyNtDr0xt1ZP_yVXc"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/645461108576/IekdbA",
      "status": "pending",
      "token": "ETUld9BZDqTwTn3Cd53OKOBurelyNtDr0xt1ZP_yVXc"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/645461108576/6pRk0Q",
      "status": "pending",
      "token": "ETUld9BZDqTwTn3Cd53OKOBurelyNtDr0xt1ZP_yVXc"
    }
  ]
}
2026-01-19 10:48:57,773:DEBUG:acme.client:Storing nonce: l5FKN_ymPwLPzYkPgjyN77ZVu0O_Fg70TZysUhnTP9mQO6lm1U4
2026-01-19 10:48:57,774:INFO:certbot._internal.auth_handler:Performing the following challenges:
2026-01-19 10:48:57,774:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.webdesigntm.online
2026-01-19 10:48:57,775:INFO:certbot._internal.plugins.webroot:Using the webroot path /var/www/html for all unmatched domains.
2026-01-19 10:48:57,775:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /var/www/html/.well-known/acme-challenge
2026-01-19 10:48:57,780:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /var/www/html/.well-known/acme-challenge/ETUld9BZDqTwTn3Cd53OKOBurelyNtDr0xt1ZP_yVXc
2026-01-19 10:48:57,781:DEBUG:acme.client:JWS payload:
b'{}'
2026-01-19 10:48:57,783:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall/998163537/645461108576/6pRk0Q:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogImw1RktOX3ltUHdMUHpZa1BnanlONzdaVnUwT19GZzcwVFp5c1VoblRQOW1RTzZsbTFVNCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwvOTk4MTYzNTM3LzY0NTQ2MTEwODU3Ni82cFJrMFEifQ",
  "signature": "hKv5E-6lNT7LjaKIyP29jzKBIOtDTWQaDkzb7omWoM6UVNryMwDbQ6C3MeBuPxYHRR95NWNyJL7vJxCw_96-jv9FuvOgoHwGGmHIQqX8Ez3D48-O0IcBEm8t9MGcwZcgOrRRKsgjhAjOn8MJsxZox7Eyoj10FnuF4e68lgMwWtwM6oHaQ65QUnt9RW6dk3HeChyKA09kodknyPbwzy5uyNN8Ftwt1tzsD_ZfoZBN7FjSoEbQPRqtdCmhRdlwthoAY55VpZmAeW0D04fKjJBfHsFXkLoKTRrNsDMBNCOLyCq7v5S30-YFB38lwvq9t3ZmribhDglUDPAgRtlUvcmtBw",
  "payload": "e30"
}
2026-01-19 10:48:57,931:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall/998163537/645461108576/6pRk0Q HTTP/1.1" 200 194
2026-01-19 10:48:57,932:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 19 Jan 2026 10:48:57 GMT
Content-Type: application/json
Content-Length: 194
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz/998163537/645461108576>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall/998163537/645461108576/6pRk0Q
Replay-Nonce: 82ktJIqYKWTZ9SeYxXBPwXacNQCc1QBWu8sEQG0S1jdbF9e-lAI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "type": "http-01",
  "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/645461108576/6pRk0Q",
  "status": "pending",
  "token": "ETUld9BZDqTwTn3Cd53OKOBurelyNtDr0xt1ZP_yVXc"
}
2026-01-19 10:48:57,933:DEBUG:acme.client:Storing nonce: 82ktJIqYKWTZ9SeYxXBPwXacNQCc1QBWu8sEQG0S1jdbF9e-lAI
2026-01-19 10:48:57,934:INFO:certbot._internal.auth_handler:Waiting for verification...
2026-01-19 10:48:58,935:DEBUG:acme.client:JWS payload:
b''
2026-01-19 10:48:58,939:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/998163537/645461108576:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogIjgya3RKSXFZS1dUWjlTZVl4WEJQd1hhY05RQ2MxUUJXdThzRVFHMFMxamRiRjllLWxBSSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovOTk4MTYzNTM3LzY0NTQ2MTEwODU3NiJ9",
  "signature": "VZNU5bJvyOLL8AXzu5yAvz9_KwAWweomFyckHmtK0DtpbYEyA81iJmnGSqsx-pQ0dCrHUGvZWPn9LOBHICgv1Ccos2vS5DKJg_52Zr58a5hbFHmSP8LZgdfnQnYFhrt2DrNI00kNMA2uXmnpkanzfCQCO6BlaljgGy-oHQqzI8DBm2lrJ3RKoRb_NHfKykod-SQNUTpq4In8crntltpUPNDwn9NsE5LEMu0jnn4tJY87xLv9-jQytCSwwMYZbFLyX0dgWPLmLLGXd3Q1ikhfC75Sq-JL5RRrSQ-rLD3z6QBwjN1LAYYG3sO9FTuF9HDKrEnoU97aYwTV3J2JKV-UGw",
  "payload": ""
}
2026-01-19 10:48:59,086:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/998163537/645461108576 HTTP/1.1" 200 778
2026-01-19 10:48:59,088:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 19 Jan 2026 10:48:59 GMT
Content-Type: application/json
Content-Length: 778
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: l5FKN_ymYmAEI9ACWXOYg4TZu1QR0wfIuEO26gzT4mvffowLz2Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "cloud.webdesigntm.online"
  },
  "status": "invalid",
  "expires": "2026-01-26T10:48:57Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/645461108576/6pRk0Q",
      "status": "invalid",
      "validated": "2026-01-19T10:48:57Z",
      "error": {
        "type": "urn:ietf:params:acme:error:dns",
        "detail": "DNS problem: NXDOMAIN looking up A for cloud.webdesigntm.online - check that a DNS record exists for this domain; DNS problem: NXDOMAIN looking up AAAA for cloud.webdesigntm.online - check that a DNS record exists for this domain",
        "status": 400
      },
      "token": "ETUld9BZDqTwTn3Cd53OKOBurelyNtDr0xt1ZP_yVXc"
    }
  ]
}
2026-01-19 10:48:59,089:DEBUG:acme.client:Storing nonce: l5FKN_ymYmAEI9ACWXOYg4TZu1QR0wfIuEO26gzT4mvffowLz2Y
2026-01-19 10:48:59,090:INFO:certbot._internal.auth_handler:Challenge failed for domain cloud.webdesigntm.online
2026-01-19 10:48:59,090:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.webdesigntm.online
2026-01-19 10:48:59,090:DEBUG:certbot._internal.display.obj:Notifying user: 
Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
  Domain: cloud.webdesigntm.online
  Type:   dns
  Detail: DNS problem: NXDOMAIN looking up A for cloud.webdesigntm.online - check that a DNS record exists for this domain; DNS problem: NXDOMAIN looking up AAAA for cloud.webdesigntm.online - check that a DNS record exists for this domain

Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.

2026-01-19 10:48:59,092:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations
    self._poll_authorizations(authzrs, max_retries, best_effort)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations
    raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

2026-01-19 10:48:59,092:DEBUG:certbot._internal.error_handler:Calling registered functions
2026-01-19 10:48:59,092:INFO:certbot._internal.auth_handler:Cleaning up challenges
2026-01-19 10:48:59,092:DEBUG:certbot._internal.plugins.webroot:Removing /var/www/html/.well-known/acme-challenge/ETUld9BZDqTwTn3Cd53OKOBurelyNtDr0xt1ZP_yVXc
2026-01-19 10:48:59,093:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up
2026-01-19 10:48:59,094:ERROR:certbot._internal.renewal:Failed to renew certificate cloud.webdesigntm.online with error: Some challenges have failed.
2026-01-19 10:48:59,099:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 485, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1441, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 127, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 345, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 424, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 476, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations
    self._poll_authorizations(authzrs, max_retries, best_effort)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations
    raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

2026-01-19 10:48:59,102:DEBUG:certbot._internal.display.obj:Notifying user: 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2026-01-19 10:48:59,103:ERROR:certbot._internal.renewal:All renewals failed. The following certificates could not be renewed:
2026-01-19 10:48:59,104:ERROR:certbot._internal.renewal:  /etc/letsencrypt/live/cloud.webdesigntm.online/fullchain.pem (failure)
2026-01-19 10:48:59,104:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2026-01-19 10:48:59,104:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "/usr/bin/certbot", line 11, in <module>
    load_entry_point('certbot==1.22.0', 'console_scripts', 'certbot')()
  File "/usr/lib/python3.6/site-packages/certbot/main.py", line 19, in main
    return internal_main.main(cli_args)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1632, in main
    return config.func(config, plugins)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1518, in renew
    renewal.handle_renewal_request(config)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 512, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 1 renew failure(s), 0 parse failure(s)
2026-01-19 10:48:59,106:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)