File: //var/log/letsencrypt/letsencrypt.log.82
2026-01-30 03:18:48,370:DEBUG:certbot._internal.main:certbot version: 1.22.0
2026-01-30 03:18:48,373:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot
2026-01-30 03:18:48,373:DEBUG:certbot._internal.main:Arguments: ['--noninteractive', '--no-random-sleep-on-renew']
2026-01-30 03:18:48,374:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2026-01-30 03:18:48,484:DEBUG:certbot._internal.log:Root logging level set at 30
2026-01-30 03:18:48,490:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/cloud.webdesigntm.online.conf
2026-01-30 03:18:48,525:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x7efd636a3128> and installer <certbot._internal.cli.cli_utils._Default object at 0x7efd636a3128>
2026-01-30 03:18:48,568:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-04-10 11:27:05 UTC.
2026-01-30 03:18:48,569:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing...
2026-01-30 03:18:48,569:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None
2026-01-30 03:18:48,573:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot
Description: Place files in webroot directory
Interfaces: Authenticator, Plugin
Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x7efd6364ac18>
Prep: True
2026-01-30 03:18:48,577:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.webroot.Authenticator object at 0x7efd6364ac18> and installer None
2026-01-30 03:18:48,577:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None
2026-01-30 03:18:48,590:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/998163537', new_authzr_uri=None, terms_of_service=None), ae859f800d1e94bed209d1184ebf3767, Meta(creation_dt=datetime.datetime(2023, 3, 7, 13, 37, 9, tzinfo=<UTC>), creation_host='cloud.webdesigntm.online', register_to_eff=None))>
2026-01-30 03:18:48,593:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2026-01-30 03:18:48,597:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2026-01-30 03:18:49,007:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 1033
2026-01-30 03:18:49,010:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 30 Jan 2026 03:18:48 GMT
Content-Type: application/json
Content-Length: 1033
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"W24YG5CIfg8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"profiles": {
"classic": "https://letsencrypt.org/docs/profiles#classic",
"shortlived": "https://letsencrypt.org/docs/profiles#shortlived",
"tlsclient": "https://letsencrypt.org/docs/profiles#tlsclient",
"tlsserver": "https://letsencrypt.org/docs/profiles#tlsserver"
},
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.6-August-18-2025.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"renewalInfo": "https://acme-v02.api.letsencrypt.org/acme/renewal-info",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2026-01-30 03:18:49,021:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for cloud.webdesigntm.online
2026-01-30 03:18:49,240:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/1446_key-certbot.pem
2026-01-30 03:18:49,294:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/1446_csr-certbot.pem
2026-01-30 03:18:49,296:DEBUG:acme.client:Requesting fresh nonce
2026-01-30 03:18:49,296:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2026-01-30 03:18:49,433:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2026-01-30 03:18:49,435:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 30 Jan 2026 03:18:49 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: ay3RMBSdA06OfRrjE1wvcyE61uvrzNTUDE-rnb4U1vwuqEfk1_0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
2026-01-30 03:18:49,435:DEBUG:acme.client:Storing nonce: ay3RMBSdA06OfRrjE1wvcyE61uvrzNTUDE-rnb4U1vwuqEfk1_0
2026-01-30 03:18:49,436:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "cloud.webdesigntm.online"\n }\n ]\n}'
2026-01-30 03:18:49,442:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogImF5M1JNQlNkQTA2T2ZScmpFMXd2Y3lFNjF1dnJ6TlRVREUtcm5iNFUxdnd1cUVmazFfMCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0",
"signature": "LNnuXOlAIxwysx-eDKtQIxeqPNS_xU2apMTwXW8Og46CeLLaQNlIPgq6jDTdoK8QWxs8f3UciRgfrphVPPy5zHVu2AQCSQ2QdNwspoDzolH4NJPiNgywah15sdFhHLAemyx60cC0Fg4Ue8sYnx94Lo1uXTJ7HdYNXR9U3Or4YFV6k5s8QDnwkjnzs9YTsnkyn6eUYf4nv7-2FeFs9cKOagOVIs35XTkZZQiMFaSNSrshvplULbtOH4_7Ka1vIRDFWpTgaLtSxuLxAU6gfeS8uXD7d-ZcU6FBLbCV74kIHkha0VRlh9bqXOP5XSjx_pfoGBKMrsS-LAtnoXZq5Nyc5w",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNsb3VkLndlYmRlc2lnbnRtLm9ubGluZSIKICAgIH0KICBdCn0"
}
2026-01-30 03:18:49,713:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356
2026-01-30 03:18:49,714:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 30 Jan 2026 03:18:49 GMT
Content-Type: application/json
Content-Length: 356
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/998163537/474921424076
Replay-Nonce: ay3RMBSdynC2JlRUr7FAQFWsi7UD_I-XRj5pn2DpSUl4N7M4ScU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "pending",
"expires": "2026-02-06T03:18:49Z",
"identifiers": [
{
"type": "dns",
"value": "cloud.webdesigntm.online"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz/998163537/650899521836"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/998163537/474921424076"
}
2026-01-30 03:18:49,714:DEBUG:acme.client:Storing nonce: ay3RMBSdynC2JlRUr7FAQFWsi7UD_I-XRj5pn2DpSUl4N7M4ScU
2026-01-30 03:18:49,715:DEBUG:acme.client:JWS payload:
b''
2026-01-30 03:18:49,718:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/998163537/650899521836:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogImF5M1JNQlNkeW5DMkpsUlVyN0ZBUUZXc2k3VURfSS1YUmo1cG4yRHBTVWw0TjdNNFNjVSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovOTk4MTYzNTM3LzY1MDg5OTUyMTgzNiJ9",
"signature": "lYAR7vV5r3GGy-fUcKDPJfX0-llYa1KlD4vtAsf3koV1qXM4cKFStUnKA3rRwBvQ9TWOkEKGGEuYBphqjLHUu_QS9TGTL1CraYHrofd6ksO8h9_FGEdFEP4B5Fl8n3bRabRCFSu--F_-mfGqrswrISV9eGPna4tlxk4b4te-sWDN7Ix1XEiRi-50Ba_jfsyQTmOYIiSLQqwIPTe13WnZeJUp0goYqXJcM_IOOS6g3NtcDpx3MJksmGeVFHVdWMlOGv04_6D_CA5bLz5y3qga8vxqMSQggaJactvfCn8yXQ3BFpKQOKJiND_9N447jrRtVbhBQm5wMp5HFBSI7DIHAQ",
"payload": ""
}
2026-01-30 03:18:49,855:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/998163537/650899521836 HTTP/1.1" 200 829
2026-01-30 03:18:49,856:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 30 Jan 2026 03:18:49 GMT
Content-Type: application/json
Content-Length: 829
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: yEIP-nqMQD7ZAYzWMaZo-VPj3J0IN68PBsGB1R7uXZ85bhcGbug
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "cloud.webdesigntm.online"
},
"status": "pending",
"expires": "2026-02-06T03:18:49Z",
"challenges": [
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650899521836/oCW4YQ",
"status": "pending",
"token": "MCBLGdZYiov_mNXCVHR-tAS8-n9HI01A0rejpwskSa4"
},
{
"type": "tls-alpn-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650899521836/Q664Ew",
"status": "pending",
"token": "MCBLGdZYiov_mNXCVHR-tAS8-n9HI01A0rejpwskSa4"
},
{
"type": "dns-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650899521836/Rz77-Q",
"status": "pending",
"token": "MCBLGdZYiov_mNXCVHR-tAS8-n9HI01A0rejpwskSa4"
}
]
}
2026-01-30 03:18:49,860:DEBUG:acme.client:Storing nonce: yEIP-nqMQD7ZAYzWMaZo-VPj3J0IN68PBsGB1R7uXZ85bhcGbug
2026-01-30 03:18:49,861:INFO:certbot._internal.auth_handler:Performing the following challenges:
2026-01-30 03:18:49,861:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.webdesigntm.online
2026-01-30 03:18:49,861:INFO:certbot._internal.plugins.webroot:Using the webroot path /var/www/html for all unmatched domains.
2026-01-30 03:18:49,861:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /var/www/html/.well-known/acme-challenge
2026-01-30 03:18:49,865:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /var/www/html/.well-known/acme-challenge/MCBLGdZYiov_mNXCVHR-tAS8-n9HI01A0rejpwskSa4
2026-01-30 03:18:49,871:DEBUG:acme.client:JWS payload:
b'{}'
2026-01-30 03:18:49,873:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650899521836/oCW4YQ:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogInlFSVAtbnFNUUQ3WkFZeldNYVpvLVZQajNKMElONjhQQnNHQjFSN3VYWjg1YmhjR2J1ZyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwvOTk4MTYzNTM3LzY1MDg5OTUyMTgzNi9vQ1c0WVEifQ",
"signature": "RiVBsNy-QDRvYIOEwz9EOIyKkcGsQ0bc42WlSsUsI4-7bCUv1wj4gUL1gzPmCl6WYY0_Ovd4yb-yHwT8Uz7ljF36z_xnByOSFGDshQ8HDvF1LDacggZ9TT09Bu0yWeqdBXcN5ApWuj8_ODs8auwUjRCS21kkYfWJ_GRj-xM1SUZwc_jjuGYfN39T9G1MswCmAQMkTO904-ObJZpTaGkYGdiIVEKdynEYwKF4AaS-Y1VSPggFi7keXd-Y3Uu8vklKEUNdwWFz52_JcK77eS2cTqxXnCYLOTlDse0qNkoYgQ7RyiD2LLaYHsMbxDjDU1O7aFu9ItHD4rfvj_jpmLpFZQ",
"payload": "e30"
}
2026-01-30 03:18:50,037:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall/998163537/650899521836/oCW4YQ HTTP/1.1" 200 194
2026-01-30 03:18:50,039:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 30 Jan 2026 03:18:49 GMT
Content-Type: application/json
Content-Length: 194
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz/998163537/650899521836>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650899521836/oCW4YQ
Replay-Nonce: ay3RMBSd2R8vJ0jraLG_UPLbnXp0PRw4u85yYtU9YZVLmQAalRQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650899521836/oCW4YQ",
"status": "pending",
"token": "MCBLGdZYiov_mNXCVHR-tAS8-n9HI01A0rejpwskSa4"
}
2026-01-30 03:18:50,039:DEBUG:acme.client:Storing nonce: ay3RMBSd2R8vJ0jraLG_UPLbnXp0PRw4u85yYtU9YZVLmQAalRQ
2026-01-30 03:18:50,040:INFO:certbot._internal.auth_handler:Waiting for verification...
2026-01-30 03:18:51,041:DEBUG:acme.client:JWS payload:
b''
2026-01-30 03:18:51,044:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/998163537/650899521836:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogImF5M1JNQlNkMlI4dkowanJhTEdfVVBMYm5YcDBQUnc0dTg1eVl0VTlZWlZMbVFBYWxSUSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovOTk4MTYzNTM3LzY1MDg5OTUyMTgzNiJ9",
"signature": "lyZiKEnu7Ck7PnZcPtIpmdApEFTuFb9kTce2TqnJRKox84j98868DofwLejehRFPbvS6M41AFqtrtUmmiDtP0YoOc6pnn90A9qCbvJVNAM6tZZQebbgLHAtBa69D0LSPzEx60FbHM6QGZSBm1EEGUnVkbz7Y7ecBj6p-WKNVGTFXPBtcLpwDttewG5zJ9tQdn6QPLtKRawvGc74b7Yl-P-On-yE91hagwQYFsDRoEO92fRn3-EKjot3tjBJbmHsFbFN5iYRuSLt4aE9nTynzC_NF_LuFaMZXHq5XAjnoXEXrAG6_mxOngyWOk2-IOlsGchdRY24eEQmLhKL5iAU-8Q",
"payload": ""
}
2026-01-30 03:18:51,182:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/998163537/650899521836 HTTP/1.1" 200 778
2026-01-30 03:18:51,184:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 30 Jan 2026 03:18:51 GMT
Content-Type: application/json
Content-Length: 778
Connection: keep-alive
Boulder-Requester: 998163537
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: ay3RMBSdaopIAfvBvkrRP43W7_ZIhDuXCTQtJDWsiAnZ76FHQpM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "cloud.webdesigntm.online"
},
"status": "invalid",
"expires": "2026-02-06T03:18:49Z",
"challenges": [
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/650899521836/oCW4YQ",
"status": "invalid",
"validated": "2026-01-30T03:18:49Z",
"error": {
"type": "urn:ietf:params:acme:error:dns",
"detail": "DNS problem: NXDOMAIN looking up A for cloud.webdesigntm.online - check that a DNS record exists for this domain; DNS problem: NXDOMAIN looking up AAAA for cloud.webdesigntm.online - check that a DNS record exists for this domain",
"status": 400
},
"token": "MCBLGdZYiov_mNXCVHR-tAS8-n9HI01A0rejpwskSa4"
}
]
}
2026-01-30 03:18:51,185:DEBUG:acme.client:Storing nonce: ay3RMBSdaopIAfvBvkrRP43W7_ZIhDuXCTQtJDWsiAnZ76FHQpM
2026-01-30 03:18:51,186:INFO:certbot._internal.auth_handler:Challenge failed for domain cloud.webdesigntm.online
2026-01-30 03:18:51,186:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.webdesigntm.online
2026-01-30 03:18:51,186:DEBUG:certbot._internal.display.obj:Notifying user:
Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
Domain: cloud.webdesigntm.online
Type: dns
Detail: DNS problem: NXDOMAIN looking up A for cloud.webdesigntm.online - check that a DNS record exists for this domain; DNS problem: NXDOMAIN looking up AAAA for cloud.webdesigntm.online - check that a DNS record exists for this domain
Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.
2026-01-30 03:18:51,188:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2026-01-30 03:18:51,189:DEBUG:certbot._internal.error_handler:Calling registered functions
2026-01-30 03:18:51,189:INFO:certbot._internal.auth_handler:Cleaning up challenges
2026-01-30 03:18:51,189:DEBUG:certbot._internal.plugins.webroot:Removing /var/www/html/.well-known/acme-challenge/MCBLGdZYiov_mNXCVHR-tAS8-n9HI01A0rejpwskSa4
2026-01-30 03:18:51,189:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up
2026-01-30 03:18:51,190:ERROR:certbot._internal.renewal:Failed to renew certificate cloud.webdesigntm.online with error: Some challenges have failed.
2026-01-30 03:18:51,196:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 485, in handle_renewal_request
main.renew_cert(lineage_config, plugins, renewal_candidate)
File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1441, in renew_cert
renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 127, in _get_and_save_cert
renewal.renew_cert(config, domains, le_client, lineage)
File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 345, in renew_cert
new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 424, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 476, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2026-01-30 03:18:51,199:DEBUG:certbot._internal.display.obj:Notifying user:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2026-01-30 03:18:51,200:ERROR:certbot._internal.renewal:All renewals failed. The following certificates could not be renewed:
2026-01-30 03:18:51,200:ERROR:certbot._internal.renewal: /etc/letsencrypt/live/cloud.webdesigntm.online/fullchain.pem (failure)
2026-01-30 03:18:51,200:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2026-01-30 03:18:51,200:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 11, in <module>
load_entry_point('certbot==1.22.0', 'console_scripts', 'certbot')()
File "/usr/lib/python3.6/site-packages/certbot/main.py", line 19, in main
return internal_main.main(cli_args)
File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1632, in main
return config.func(config, plugins)
File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1518, in renew
renewal.handle_renewal_request(config)
File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 512, in handle_renewal_request
len(renew_failures), len(parse_failures)))
certbot.errors.Error: 1 renew failure(s), 0 parse failure(s)
2026-01-30 03:18:51,203:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)