Debian - unable to contact snap store

Hello; I have to use SNAPD to install certbot and I can not install the core module of SNAPD My machine is a vps on OVH.com

debian@vps-64826c3b:~$ sudo snap install core

error: unable to contact snap store


snap version

debian@vps-64826c3b:~$ snap version  
snap    2.49-1+b5  
snapd   2.49-1+b5   
series  16  
debian  11  
kernel  5.10.0-10-cloud-amd64  

Here is the main log:

Dec 28 15:22:08 vps-64826c3b systemd[1]: Starting Snap Daemon...
Dec 28 15:22:08 vps-64826c3b snapd[2203]: AppArmor status: apparmor is enabled but some kernel features are missing: dbus, network
Dec 28 15:22:08 vps-64826c3b snapd[2203]: daemon.go:347: started snapd/2.49-1+b5 (series 16; classic; devmode) debian/11 (amd64) linux/5.10.0-10-cloud-amd64.
Dec 28 15:22:08 vps-64826c3b snapd[2203]: daemon.go:440: adjusting startup timeout by 30s (pessimistic estimate of 30s plus 5s per snap)
Dec 28 15:22:08 vps-64826c3b snapd[2203]: standby.go:96: DEBUG: will consider standby after: 5s
Dec 28 15:22:08 vps-64826c3b snapd[2203]: main.go:88: DEBUG: Setting up sd_notify() watchdog timer every 2m30s
Dec 28 15:22:08 vps-64826c3b snapd[2203]: main.go:149: DEBUG: activation done in 55ms
Dec 28 15:22:08 vps-64826c3b systemd[1]: Started Snap Daemon.
Dec 28 15:22:08 vps-64826c3b snapd[2203]: catalogrefresh.go:113: DEBUG: Catalog refresh starting now; next scheduled for 2021-12-29 16:18:15.966658221 +0100 CET m=+89767.271992619.
Dec 28 15:22:08 vps-64826c3b snapd[2203]: retry.go:49: DEBUG: Retrying https://api.snapcraft.io/api/v1/snaps/sections, attempt 1, elapsed time=3.156µs
Dec 28 15:22:08 vps-64826c3b snapd[2203]: api.go:383: Installing snap "core" revision unset
Dec 28 15:22:08 vps-64826c3b snapd[2203]: retry.go:49: DEBUG: Retrying https://api.snapcraft.io/v2/snaps/refresh, attempt 1, elapsed time=3.693µs
Dec 28 15:22:08 vps-64826c3b snapd[2203]: store.go:929: DEBUG: cannot set device session: no device serial yet
Dec 28 15:22:18 vps-64826c3b snapd[2203]: retry.go:120: DEBUG: Retrying because of: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)
Dec 28 15:22:18 vps-64826c3b snapd[2203]: retry.go:112: DEBUG: ShouldRetryError: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers) *http.httpError -> true
Dec 28 15:22:18 vps-64826c3b snapd[2203]: retry.go:49: DEBUG: Retrying https://api.snapcraft.io/api/v1/snaps/sections, attempt 2, elapsed time=10.000539884s
Dec 28 15:22:18 vps-64826c3b snapd[2203]: retry.go:120: DEBUG: Retrying because of: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)
Dec 28 15:22:18 vps-64826c3b snapd[2203]: retry.go:112: DEBUG: ShouldRetryError: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers) *http.httpError -> true
Dec 28 15:22:18 vps-64826c3b snapd[2203]: retry.go:49: DEBUG: Retrying https://api.snapcraft.io/v2/snaps/refresh, attempt 2, elapsed time=10.000533292s
Dec 28 15:22:18 vps-64826c3b snapd[2203]: store.go:929: DEBUG: cannot set device session: no device serial yet
Dec 28 15:22:28 vps-64826c3b snapd[2203]: retry.go:120: DEBUG: Retrying because of: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)
Dec 28 15:22:28 vps-64826c3b snapd[2203]: retry.go:112: DEBUG: ShouldRetryError: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers) *http.httpError -> true
Dec 28 15:22:28 vps-64826c3b snapd[2203]: retry.go:49: DEBUG: Retrying https://api.snapcraft.io/api/v1/snaps/sections, attempt 3, elapsed time=20.00114875s
Dec 28 15:22:28 vps-64826c3b snapd[2203]: retry.go:120: DEBUG: Retrying because of: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)
Dec 28 15:22:28 vps-64826c3b snapd[2203]: retry.go:112: DEBUG: ShouldRetryError: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers) *http.httpError -> true
Dec 28 15:22:28 vps-64826c3b snapd[2203]: retry.go:49: DEBUG: Retrying https://api.snapcraft.io/v2/snaps/refresh, attempt 3, elapsed time=20.001299926s
Dec 28 15:22:28 vps-64826c3b snapd[2203]: store.go:929: DEBUG: cannot set device session: no device serial yet
Dec 28 15:22:38 vps-64826c3b snapd[2203]: retry.go:120: DEBUG: Retrying because of: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)
Dec 28 15:22:38 vps-64826c3b snapd[2203]: retry.go:112: DEBUG: ShouldRetryError: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers) *http.httpError -> true
Dec 28 15:22:38 vps-64826c3b snapd[2203]: retry.go:49: DEBUG: Retrying https://api.snapcraft.io/api/v1/snaps/sections, attempt 4, elapsed time=30.001809188s
Dec 28 15:22:38 vps-64826c3b snapd[2203]: retry.go:120: DEBUG: Retrying because of: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)
Dec 28 15:22:38 vps-64826c3b snapd[2203]: retry.go:112: DEBUG: ShouldRetryError: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers) *http.httpError -> true
Dec 28 15:22:38 vps-64826c3b snapd[2203]: retry.go:49: DEBUG: Retrying https://api.snapcraft.io/v2/snaps/refresh, attempt 4, elapsed time=30.00231048s
Dec 28 15:22:38 vps-64826c3b snapd[2203]: store.go:929: DEBUG: cannot set device session: no device serial yet
Dec 28 15:22:48 vps-64826c3b snapd[2203]: retry.go:61: DEBUG: The retry loop for https://api.snapcraft.io/api/v1/snaps/sections finished after 4 retries, elapsed time=40.00244124s, status: Get "https://api.snapcraft.io/api/v1/snaps/sections": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)
Dec 28 15:22:48 vps-64826c3b snapd[2203]: catalogrefresh.go:123: DEBUG: Catalog refresh failed: Get "https://api.snapcraft.io/api/v1/snaps/sections": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers).
Dec 28 15:22:48 vps-64826c3b snapd[2203]: stateengine.go:150: state ensure error: Get "https://api.snapcraft.io/api/v1/snaps/sections": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)
Dec 28 15:22:48 vps-64826c3b snapd[2203]: retry.go:61: DEBUG: The retry loop for https://api.snapcraft.io/v2/snaps/refresh finished after 4 retries, elapsed time=40.002787388s, status: Post "https://api.snapcraft.io/v2/snaps/refresh": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)
Dec 28 15:22:48 vps-64826c3b snapd[2203]: daemon.go:317: DEBUG: pid=2198;uid=0;socket=/run/snapd.socket; POST /v2/snaps/core 40.003755761s 400

Here the log of tcpdump

sudo tcpdump -nn | grep 91.189.

debian@vps-64826c3b:~$ sudo tcpdump -nn | grep 91.189.
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
15:29:01.442068 IP 213.186.33.99.53 > 152.228.163.100.55637: 19921 6/0/0 A 91.189.92.41, A 91.189.92.39, A 91.189.92.40, A 91.189.92.38, A 91.189.92.19, A 91.189.92.20 (130)
15:29:01.442263 IP 152.228.163.100.36748 > 91.189.92.41.443: Flags [S], seq 2879519396, win 64240, options [mss 1460,sackOK,TS val 1117612676 ecr 0,nop,wscale 7], length 0
15:29:01.442293 IP 152.228.163.100.36750 > 91.189.92.41.443: Flags [S], seq 972340539, win 64240, options [mss 1460,sackOK,TS val 1117612676 ecr 0,nop,wscale 7], length 0
15:29:02.447447 IP 152.228.163.100.36750 > 91.189.92.41.443: Flags [S], seq 972340539, win 64240, options [mss 1460,sackOK,TS val 1117613681 ecr 0,nop,wscale 7], length 0
15:29:02.447479 IP 152.228.163.100.36748 > 91.189.92.41.443: Flags [S], seq 2879519396, win 64240, options [mss 1460,sackOK,TS val 1117613681 ecr 0,nop,wscale 7], length 0
15:29:04.463541 IP 152.228.163.100.36748 > 91.189.92.41.443: Flags [S], seq 2879519396, win 64240, options [mss 1460,sackOK,TS val 1117615697 ecr 0,nop,wscale 7], length 0
15:29:04.463564 IP 152.228.163.100.36750 > 91.189.92.41.443: Flags [S], seq 972340539, win 64240, options [mss 1460,sackOK,TS val 1117615697 ecr 0,nop,wscale 7], length 0
15:29:08.559442 IP 152.228.163.100.36750 > 91.189.92.41.443: Flags [S], seq 972340539, win 64240, options [mss 1460,sackOK,TS val 1117619793 ecr 0,nop,wscale 7], length 0
15:29:08.559464 IP 152.228.163.100.36748 > 91.189.92.41.443: Flags [S], seq 2879519396, win 64240, options [mss 1460,sackOK,TS val 1117619793 ecr 0,nop,wscale 7], length 0
15:29:11.366966 IP 213.186.33.99.53 > 152.228.163.100.54779: 33961 6/0/0 A 91.189.92.19, A 91.189.92.20, A 91.189.92.41, A 91.189.92.39, A 91.189.92.40, A 91.189.92.38 (130)
15:29:11.367181 IP 152.228.163.100.46110 > 91.189.92.19.443: Flags [S], seq 3481713260, win 64240, options [mss 1460,sackOK,TS val 2930311203 ecr 0,nop,wscale 7], length 0
15:29:11.382329 IP 213.186.33.99.53 > 152.228.163.100.60430: 7238 6/0/0 A 91.189.92.38, A 91.189.92.41, A 91.189.92.20, A 91.189.92.40, A 91.189.92.19, A 91.189.92.39 (130)
15:29:11.382514 IP 152.228.163.100.41090 > 91.189.92.38.443: Flags [S], seq 3925990775, win 64240, options [mss 1460,sackOK,TS val 2369276599 ecr 0,nop,wscale 7], length 0
15:29:12.367437 IP 152.228.163.100.46110 > 91.189.92.19.443: Flags [S], seq 3481713260, win 64240, options [mss 1460,sackOK,TS val 2930312203 ecr 0,nop,wscale 7], length 0
15:29:12.399405 IP 152.228.163.100.41090 > 91.189.92.38.443: Flags [S], seq 3925990775, win 64240, options [mss 1460,sackOK,TS val 2369277616 ecr 0,nop,wscale 7], length 0
15:29:14.383476 IP 152.228.163.100.46110 > 91.189.92.19.443: Flags [S], seq 3481713260, win 64240, options [mss 1460,sackOK,TS val 2930314219 ecr 0,nop,wscale 7], length 0
15:29:14.415450 IP 152.228.163.100.41090 > 91.189.92.38.443: Flags [S], seq 3925990775, win 64240, options [mss 1460,sackOK,TS val 2369279632 ecr 0,nop,wscale 7], length 0
15:29:16.751494 IP 152.228.163.100.36748 > 91.189.92.41.443: Flags [S], seq 2879519396, win 64240, options [mss 1460,sackOK,TS val 1117627985 ecr 0,nop,wscale 7], length 0
15:29:16.751524 IP 152.228.163.100.36750 > 91.189.92.41.443: Flags [S], seq 972340539, win 64240, options [mss 1460,sackOK,TS val 1117627985 ecr 0,nop,wscale 7], length 0
15:29:18.543460 IP 152.228.163.100.41090 > 91.189.92.38.443: Flags [S], seq 3925990775, win 64240, options [mss 1460,sackOK,TS val 2369283760 ecr 0,nop,wscale 7], length 0
15:29:18.543494 IP 152.228.163.100.46110 > 91.189.92.19.443: Flags [S], seq 3481713260, win 64240, options [mss 1460,sackOK,TS val 2930318379 ecr 0,nop,wscale 7], length 0
15:29:21.367671 IP 213.186.33.99.53 > 152.228.163.100.41879: 42536 6/0/0 A 91.189.92.19, A 91.189.92.39, A 91.189.92.38, A 91.189.92.41, A 91.189.92.20, A 91.189.92.40 (130)
15:29:21.368064 IP 152.228.163.100.46114 > 91.189.92.19.443: Flags [S], seq 2275305387, win 64240, options [mss 1460,sackOK,TS val 2930321204 ecr 0,nop,wscale 7], length 0
15:29:21.383158 IP 213.186.33.99.53 > 152.228.163.100.59954: 41158 6/0/0 A 91.189.92.20, A 91.189.92.41, A 91.189.92.39, A 91.189.92.40, A 91.189.92.38, A 91.189.92.19 (130)
15:29:21.383705 IP 152.228.163.100.56920 > 91.189.92.20.443: Flags [S], seq 1742642666, win 64240, options [mss 1460,sackOK,TS val 3680728777 ecr 0,nop,wscale 7], length 0
15:29:22.383466 IP 152.228.163.100.46114 > 91.189.92.19.443: Flags [S], seq 2275305387, win 64240, options [mss 1460,sackOK,TS val 2930322219 ecr 0,nop,wscale 7], length 0
15:29:22.415480 IP 152.228.163.100.56920 > 91.189.92.20.443: Flags [S], seq 1742642666, win 64240, options [mss 1460,sackOK,TS val 3680729809 ecr 0,nop,wscale 7], length 0
15:29:24.399456 IP 152.228.163.100.46114 > 91.189.92.19.443: Flags [S], seq 2275305387, win 64240, options [mss 1460,sackOK,TS val 2930324235 ecr 0,nop,wscale 7], length 0
15:29:24.431461 IP 152.228.163.100.56920 > 91.189.92.20.443: Flags [S], seq 1742642666, win 64240, options [mss 1460,sackOK,TS val 3680731825 ecr 0,nop,wscale 7], length 0
15:29:26.735467 IP 152.228.163.100.46110 > 91.189.92.19.443: Flags [S], seq 3481713260, win 64240, options [mss 1460,sackOK,TS val 2930326571 ecr 0,nop,wscale 7], length 0
15:29:26.735497 IP 152.228.163.100.41090 > 91.189.92.38.443: Flags [S], seq 3925990775, win 64240, options [mss 1460,sackOK,TS val 2369291952 ecr 0,nop,wscale 7], length 0
15:29:28.527446 IP 152.228.163.100.56920 > 91.189.92.20.443: Flags [S], seq 1742642666, win 64240, options [mss 1460,sackOK,TS val 3680735921 ecr 0,nop,wscale 7], length 0
15:29:28.527485 IP 152.228.163.100.46114 > 91.189.92.19.443: Flags [S], seq 2275305387, win 64240, options [mss 1460,sackOK,TS val 2930328363 ecr 0,nop,wscale 7], length 0
15:29:31.368692 IP 213.186.33.99.53 > 152.228.163.100.43089: 9220 6/0/0 A 91.189.92.38, A 91.189.92.19, A 91.189.92.20, A 91.189.92.41, A 91.189.92.39, A 91.189.92.40 (130)
15:29:31.369290 IP 152.228.163.100.41096 > 91.189.92.38.443: Flags [S], seq 233819566, win 64240, options [mss 1460,sackOK,TS val 2369296586 ecr 0,nop,wscale 7], length 0
15:29:31.383468 IP 213.186.33.99.53 > 152.228.163.100.38537: 52614 6/0/0 A 91.189.92.38, A 91.189.92.41, A 91.189.92.20, A 91.189.92.40, A 91.189.92.19, A 91.189.92.39 (130)
15:29:31.383798 IP 152.228.163.100.41098 > 91.189.92.38.443: Flags [S], seq 3479814853, win 64240, options [mss 1460,sackOK,TS val 2369296600 ecr 0,nop,wscale 7], length 0
15:29:32.399432 IP 152.228.163.100.41098 > 91.189.92.38.443: Flags [S], seq 3479814853, win 64240, options [mss 1460,sackOK,TS val 2369297616 ecr 0,nop,wscale 7], length 0
15:29:32.399458 IP 152.228.163.100.41096 > 91.189.92.38.443: Flags [S], seq 233819566, win 64240, options [mss 1460,sackOK,TS val 2369297616 ecr 0,nop,wscale 7], length 0
15:29:32.879462 IP 152.228.163.100.36750 > 91.189.92.41.443: Flags [S], seq 972340539, win 64240, options [mss 1460,sackOK,TS val 1117644113 ecr 0,nop,wscale 7], length 0
15:29:32.879490 IP 152.228.163.100.36748 > 91.189.92.41.443: Flags [S], seq 2879519396, win 64240, options [mss 1460,sackOK,TS val 1117644113 ecr 0,nop,wscale 7], length 0
15:29:34.415492 IP 152.228.163.100.41096 > 91.189.92.38.443: Flags [S], seq 233819566, win 64240, options [mss 1460,sackOK,TS val 2369299632 ecr 0,nop,wscale 7], length 0
15:29:34.415540 IP 152.228.163.100.41098 > 91.189.92.38.443: Flags [S], seq 3479814853, win 64240, options [mss 1460,sackOK,TS val 2369299632 ecr 0,nop,wscale 7], length 0
15:29:36.719487 IP 152.228.163.100.46114 > 91.189.92.19.443: Flags [S], seq 2275305387, win 64240, options [mss 1460,sackOK,TS val 2930336555 ecr 0,nop,wscale 7], length 0
15:29:36.719529 IP 152.228.163.100.56920 > 91.189.92.20.443: Flags [S], seq 1742642666, win 64240, options [mss 1460,sackOK,TS val 3680744113 ecr 0,nop,wscale 7], length 0
15:29:38.511478 IP 152.228.163.100.41098 > 91.189.92.38.443: Flags [S], seq 3479814853, win 64240, options [mss 1460,sackOK,TS val 2369303728 ecr 0,nop,wscale 7], length 0
15:29:38.511521 IP 152.228.163.100.41096 > 91.189.92.38.443: Flags [S], seq 233819566, win 64240, options [mss 1460,sackOK,TS val 2369303728 ecr 0,nop,wscale 7], length 0
15:29:42.863439 IP 152.228.163.100.41090 > 91.189.92.38.443: Flags [S], seq 3925990775, win 64240, options [mss 1460,sackOK,TS val 2369308080 ecr 0,nop,wscale 7], length 0
15:29:42.863472 IP 152.228.163.100.46110 > 91.189.92.19.443: Flags [S], seq 3481713260, win 64240, options [mss 1460,sackOK,TS val 2930342699 ecr 0,nop,wscale 7], length 0
15:29:46.703433 IP 152.228.163.100.41096 > 91.189.92.38.443: Flags [S], seq 233819566, win 64240, options [mss 1460,sackOK,TS val 2369311920 ecr 0,nop,wscale 7], length 0
15:29:46.703456 IP 152.228.163.100.41098 > 91.189.92.38.443: Flags [S], seq 3479814853, win 64240, options [mss 1460,sackOK,TS val 2369311920 ecr 0,nop,wscale 7], length 0

Is someone can help me on this issue please ?