HEX
Server: Apache
System: Linux cloud.webdesigntm.online 4.18.0-477.10.1.el8_8.x86_64 #1 SMP Tue May 16 07:35:04 EDT 2023 x86_64
User: imperoro (1004)
PHP: 8.0.30
Disabled: exec,passthru,shell_exec,system
Upload Files
File: //var/log/letsencrypt/letsencrypt.log.83
2026-01-29 14:53:19,821:DEBUG:certbot._internal.main:certbot version: 1.22.0
2026-01-29 14:53:19,823:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot
2026-01-29 14:53:19,823:DEBUG:certbot._internal.main:Arguments: ['--noninteractive', '--no-random-sleep-on-renew']
2026-01-29 14:53:19,824:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2026-01-29 14:53:19,926:DEBUG:certbot._internal.log:Root logging level set at 30
2026-01-29 14:53:19,931:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/cloud.webdesigntm.online.conf
2026-01-29 14:53:19,972:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x7fbeadb53128> and installer <certbot._internal.cli.cli_utils._Default object at 0x7fbeadb53128>
2026-01-29 14:53:20,013:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-04-10 11:27:05 UTC.
2026-01-29 14:53:20,014:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing...
2026-01-29 14:53:20,014:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None
2026-01-29 14:53:20,020:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot
Description: Place files in webroot directory
Interfaces: Authenticator, Plugin
Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x7fbeadaf9c18>
Prep: True
2026-01-29 14:53:20,021:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.webroot.Authenticator object at 0x7fbeadaf9c18> and installer None
2026-01-29 14:53:20,021:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None
2026-01-29 14:53:20,035:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/998163537', new_authzr_uri=None, terms_of_service=None), ae859f800d1e94bed209d1184ebf3767, Meta(creation_dt=datetime.datetime(2023, 3, 7, 13, 37, 9, tzinfo=<UTC>), creation_host='cloud.webdesigntm.online', register_to_eff=None))>
2026-01-29 14:53:20,037:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2026-01-29 14:53:20,040:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2026-01-29 14:53:20,447:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 1033
2026-01-29 14:53:20,448:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 29 Jan 2026 14:53:20 GMT
Content-Type: application/json
Content-Length: 1033
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "profiles": {
      "classic": "https://letsencrypt.org/docs/profiles#classic",
      "shortlived": "https://letsencrypt.org/docs/profiles#shortlived",
      "tlsclient": "https://letsencrypt.org/docs/profiles#tlsclient",
      "tlsserver": "https://letsencrypt.org/docs/profiles#tlsserver"
    },
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.6-August-18-2025.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "o6iRkOG2v60": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/acme/renewal-info",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2026-01-29 14:53:20,450:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for cloud.webdesigntm.online
2026-01-29 14:53:20,838:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/1445_key-certbot.pem
2026-01-29 14:53:20,882:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/1445_csr-certbot.pem
2026-01-29 14:53:20,883:DEBUG:acme.client:Requesting fresh nonce
2026-01-29 14:53:20,883:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2026-01-29 14:53:21,165:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2026-01-29 14:53:21,166:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 29 Jan 2026 14:53:21 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: F4vGLPjlD2dAP48ujx64KhyZqJFUsXoswvcMKSaS-MXpOBbzDms
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2026-01-29 14:53:21,166:DEBUG:acme.client:Storing nonce: F4vGLPjlD2dAP48ujx64KhyZqJFUsXoswvcMKSaS-MXpOBbzDms
2026-01-29 14:53:21,167:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "cloud.webdesigntm.online"\n    }\n  ]\n}'
2026-01-29 14:53:21,176:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogIkY0dkdMUGpsRDJkQVA0OHVqeDY0S2h5WnFKRlVzWG9zd3ZjTUtTYVMtTVhwT0JiekRtcyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0",
  "signature": "ZVx7dSaOTASqW-ynjAYni9lsg960infqX9rz3D97XTtsLLVrWDkT-lQxDO26DWOuYwzYnNFU2COWAmEmqQbujknk4WhLtAvEJv6TgkOg_CqzXXaysp3pCYX9gVMw7h9Qm3O1hkEWlkHEriYrIRo7g1HjX9og2-lFfl0AfkPrPPtGsMdso-UfCHVP2cUDMV_s_moPkiYYSdDkvjknLR9R2DyUgkYLwYL61eq6m44qxv0D-jii_myMhYhzp_j5zctN2uHbKcSini6UGAAg-wygyFYZnc-W1e7sVaZ6ArQeY0vlgKDQ51XgxXJnDvTPE_EIMqns-OhRM2Ht1hrz_IQl7g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNsb3VkLndlYmRlc2lnbnRtLm9ubGluZSIKICAgIH0KICBdCn0"
}
2026-01-29 14:53:21,469:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356
2026-01-29 14:53:21,470:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 29 Jan 2026 14:53:21 GMT
Content-Type: application/json
Content-Length: 356
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/998163537/474743263336
Replay-Nonce: z6o3uXKgujEpWvDWeBgCY7TNeMF3aX7qYVrWWlc8_irIuyfwb-o
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2026-02-05T14:53:21Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "cloud.webdesigntm.online"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz/998163537/650640806366"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/998163537/474743263336"
}
2026-01-29 14:53:21,470:DEBUG:acme.client:Storing nonce: z6o3uXKgujEpWvDWeBgCY7TNeMF3aX7qYVrWWlc8_irIuyfwb-o
2026-01-29 14:53:21,471:DEBUG:acme.client:JWS payload:
b''
2026-01-29 14:53:21,473:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/998163537/650640806366:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogIno2bzN1WEtndWpFcFd2RFdlQmdDWTdUTmVNRjNhWDdxWVZyV1dsYzhfaXJJdXlmd2ItbyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovOTk4MTYzNTM3LzY1MDY0MDgwNjM2NiJ9",
  "signature": "XymCAA4T9BF2vRIWseLGX86981tggT3sJ7AVUIQmitqZwdhAuVcprS-6xARUNd7H-R7w4YvApR2hHEvpstlNmBXYlUxvvF1RKx2ta2uv5wlWYw157PrrEUn8lTRmhWddpnkmjyKCSSK81AhagvzTHC5d_13h89iLwI2nrUmhYZQgaPTfBj2jM-jTDMjyklBRRfH7z-XasrL4F6dI5sBIUji2QKIuI-MFyH_czhB0nn7M78E0bCMqgqxzfm1OuHW02WrUixb0cJuG03Oj50BupcbXZKK4MOJqfZvOQvBSYDjMg_HTKeyxkSsKVoJLYMxuAil0qeykrPoBvoizIsEUKA",
  "payload": ""
}
2026-01-29 14:53:21,611:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/998163537/650640806366 HTTP/1.1" 200 829
2026-01-29 14:53:21,613:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 29 Jan 2026 14:53:21 GMT
Content-Type: application/json
Content-Length: 829
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: F4vGLPjljQTZtfEMa1Xbolu5e4iye1gEMhinm-KOqZaql6v-tzI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "cloud.webdesigntm.online"
  },
  "status": "pending",
  "expires": "2026-02-05T14:53:21Z",
  "challenges": [
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650640806366/wGRifg",
      "status": "pending",
      "token": "efw1IdVisA6jd-_UZQ4vYHpB5_W1EDRlt4kPg-NZE-8"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650640806366/vsW13A",
      "status": "pending",
      "token": "efw1IdVisA6jd-_UZQ4vYHpB5_W1EDRlt4kPg-NZE-8"
    },
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650640806366/hNKJNQ",
      "status": "pending",
      "token": "efw1IdVisA6jd-_UZQ4vYHpB5_W1EDRlt4kPg-NZE-8"
    }
  ]
}
2026-01-29 14:53:21,613:DEBUG:acme.client:Storing nonce: F4vGLPjljQTZtfEMa1Xbolu5e4iye1gEMhinm-KOqZaql6v-tzI
2026-01-29 14:53:21,614:INFO:certbot._internal.auth_handler:Performing the following challenges:
2026-01-29 14:53:21,614:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.webdesigntm.online
2026-01-29 14:53:21,614:INFO:certbot._internal.plugins.webroot:Using the webroot path /var/www/html for all unmatched domains.
2026-01-29 14:53:21,615:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /var/www/html/.well-known/acme-challenge
2026-01-29 14:53:21,619:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /var/www/html/.well-known/acme-challenge/efw1IdVisA6jd-_UZQ4vYHpB5_W1EDRlt4kPg-NZE-8
2026-01-29 14:53:21,621:DEBUG:acme.client:JWS payload:
b'{}'
2026-01-29 14:53:21,624:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650640806366/hNKJNQ:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogIkY0dkdMUGpsalFUWnRmRU1hMVhib2x1NWU0aXllMWdFTWhpbm0tS09xWmFxbDZ2LXR6SSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwvOTk4MTYzNTM3LzY1MDY0MDgwNjM2Ni9oTktKTlEifQ",
  "signature": "vGKI5sOXcxiO74n5dEJIevsFKHMvH9mWRWzVdMWvcAFCORUPLcUuQirYIGcKfXZj470iM1tKcouyLxAUehw5a3knf9lj_wjlJGFzFb9qX9U6gcTNDGJckCzntMRguokylZu4GkOcGiX4QhLf8i2Fdm9r1wEkqyH6XaPntEWVnVgqU1AZe0GjxtZgCtDdFfQTwkI4_8QIONVMWqMJYycbKK8lwSMHtOvVo6C70vUKCa0htiRMWyJtmxKTqwI1ehBGn9yPKNqOgzXoZZqOEOnhkDYyZ4-WPvOV5Rk7iHgKCsTcBk_puGBmRkafvFdQpt2JPQEiwcmZV8zE1cwLH1Ohsg",
  "payload": "e30"
}
2026-01-29 14:53:21,763:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall/998163537/650640806366/hNKJNQ HTTP/1.1" 200 194
2026-01-29 14:53:21,765:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 29 Jan 2026 14:53:21 GMT
Content-Type: application/json
Content-Length: 194
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz/998163537/650640806366>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650640806366/hNKJNQ
Replay-Nonce: z6o3uXKgp4HMVCtdot9itWkJjcZlUtxB3L1Ev01vzYmOdhfD8vU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "type": "http-01",
  "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650640806366/hNKJNQ",
  "status": "pending",
  "token": "efw1IdVisA6jd-_UZQ4vYHpB5_W1EDRlt4kPg-NZE-8"
}
2026-01-29 14:53:21,765:DEBUG:acme.client:Storing nonce: z6o3uXKgp4HMVCtdot9itWkJjcZlUtxB3L1Ev01vzYmOdhfD8vU
2026-01-29 14:53:21,766:INFO:certbot._internal.auth_handler:Waiting for verification...
2026-01-29 14:53:22,766:DEBUG:acme.client:JWS payload:
b''
2026-01-29 14:53:22,770:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/998163537/650640806366:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogIno2bzN1WEtncDRITVZDdGRvdDlpdFdrSmpjWmxVdHhCM0wxRXYwMXZ6WW1PZGhmRDh2VSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovOTk4MTYzNTM3LzY1MDY0MDgwNjM2NiJ9",
  "signature": "JZ7p43koEHwGncqZH5g-UrS4hX8x1E0MeX6Wn3GIrxzIivThqeUhFJFV_TYXFa7u_5m0Fr7-EXOVne2gEhV-_bZRKNSzif5MrlPNPfiNOn9ZRkUFu_U5wVb6lOmqw_Yf0eqPcF-HOR0inqZnhTBNjdrFxlqKrq-VVwHbQfxAR55_TdTMMpNmZffb2QpZJD-FlSR0jqhE9n4UoYKJpkOAi4vdMPB78uj7C6QVE0WNbNe74n-qrgvZsiS_4Zxfwb6JO7GROO4l--LDLePy4FLIDGA5feizSDW_Ro-dfZyh-eBEJkFuk8zDEKAKntm59twK18FGcqwVdFasVfR3PL2qPw",
  "payload": ""
}
2026-01-29 14:53:22,909:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/998163537/650640806366 HTTP/1.1" 200 778
2026-01-29 14:53:22,913:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 29 Jan 2026 14:53:22 GMT
Content-Type: application/json
Content-Length: 778
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: z6o3uXKgyhRF4sCNywfYj-JocE5CsY3YLsw6X7KXKGDp9GtDU98
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "cloud.webdesigntm.online"
  },
  "status": "invalid",
  "expires": "2026-02-05T14:53:21Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650640806366/hNKJNQ",
      "status": "invalid",
      "validated": "2026-01-29T14:53:21Z",
      "error": {
        "type": "urn:ietf:params:acme:error:dns",
        "detail": "DNS problem: NXDOMAIN looking up A for cloud.webdesigntm.online - check that a DNS record exists for this domain; DNS problem: NXDOMAIN looking up AAAA for cloud.webdesigntm.online - check that a DNS record exists for this domain",
        "status": 400
      },
      "token": "efw1IdVisA6jd-_UZQ4vYHpB5_W1EDRlt4kPg-NZE-8"
    }
  ]
}
2026-01-29 14:53:22,914:DEBUG:acme.client:Storing nonce: z6o3uXKgyhRF4sCNywfYj-JocE5CsY3YLsw6X7KXKGDp9GtDU98
2026-01-29 14:53:22,915:INFO:certbot._internal.auth_handler:Challenge failed for domain cloud.webdesigntm.online
2026-01-29 14:53:22,915:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.webdesigntm.online
2026-01-29 14:53:22,916:DEBUG:certbot._internal.display.obj:Notifying user: 
Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
  Domain: cloud.webdesigntm.online
  Type:   dns
  Detail: DNS problem: NXDOMAIN looking up A for cloud.webdesigntm.online - check that a DNS record exists for this domain; DNS problem: NXDOMAIN looking up AAAA for cloud.webdesigntm.online - check that a DNS record exists for this domain

Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.

2026-01-29 14:53:22,922:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations
    self._poll_authorizations(authzrs, max_retries, best_effort)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations
    raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

2026-01-29 14:53:22,922:DEBUG:certbot._internal.error_handler:Calling registered functions
2026-01-29 14:53:22,923:INFO:certbot._internal.auth_handler:Cleaning up challenges
2026-01-29 14:53:22,923:DEBUG:certbot._internal.plugins.webroot:Removing /var/www/html/.well-known/acme-challenge/efw1IdVisA6jd-_UZQ4vYHpB5_W1EDRlt4kPg-NZE-8
2026-01-29 14:53:22,923:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up
2026-01-29 14:53:22,924:ERROR:certbot._internal.renewal:Failed to renew certificate cloud.webdesigntm.online with error: Some challenges have failed.
2026-01-29 14:53:22,932:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 485, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1441, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 127, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 345, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 424, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 476, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations
    self._poll_authorizations(authzrs, max_retries, best_effort)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations
    raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

2026-01-29 14:53:22,934:DEBUG:certbot._internal.display.obj:Notifying user: 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2026-01-29 14:53:22,935:ERROR:certbot._internal.renewal:All renewals failed. The following certificates could not be renewed:
2026-01-29 14:53:22,936:ERROR:certbot._internal.renewal:  /etc/letsencrypt/live/cloud.webdesigntm.online/fullchain.pem (failure)
2026-01-29 14:53:22,936:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2026-01-29 14:53:22,936:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "/usr/bin/certbot", line 11, in <module>
    load_entry_point('certbot==1.22.0', 'console_scripts', 'certbot')()
  File "/usr/lib/python3.6/site-packages/certbot/main.py", line 19, in main
    return internal_main.main(cli_args)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1632, in main
    return config.func(config, plugins)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1518, in renew
    renewal.handle_renewal_request(config)
  File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 512, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 1 renew failure(s), 0 parse failure(s)
2026-01-29 14:53:22,938:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)