2024-12-08 06:55:44,640:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-12-08 06:55:44,641:DEBUG:certbot._internal.main:Arguments: ['--force-renewal', '-d', '*.daisuke-design.pl', '-d', 'daisuke-design.pl'] 2024-12-08 06:55:44,641:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-12-08 06:55:45,247:DEBUG:certbot._internal.log:Root logging level set at 20 2024-12-08 06:55:45,247:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-12-08 06:55:45,254:DEBUG:certbot._internal.plugins.selection:Requested authenticator None and installer None 2024-12-08 06:55:45,264:DEBUG:certbot._internal.plugins.selection:Multiple candidate plugins: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True * webroot Description: Place files in webroot directory Interfaces: IAuthenticator, IPlugin Entry point: webroot = certbot._internal.plugins.webroot:Authenticator Initialized: Prep: True 2024-12-08 06:55:49,707:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-12-08 06:55:49,708:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-12-08 06:55:49,715:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-12-08 06:55:49,716:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-12-08 06:55:49,720:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-12-08 06:55:50,207:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-12-08 06:55:50,208:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 08 Dec 2024 05:55:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pXJeMPVfHog": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-12-08 06:55:50,256:INFO:certbot._internal.main:Renewing an existing certificate 2024-12-08 06:55:56,589:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8813_key-certbot.pem 2024-12-08 06:56:02,712:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8811_csr-certbot.pem 2024-12-08 06:56:02,712:DEBUG:acme.client:Requesting fresh nonce 2024-12-08 06:56:02,712:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-12-08 06:56:02,871:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-12-08 06:56:02,872:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 08 Dec 2024 05:55:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qM6CNfq-8tkIk0SwMGFiIEFjktpGgeNyBAacXQEA8etQbcmVc_A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-12-08 06:56:02,872:DEBUG:acme.client:Storing nonce: qM6CNfq-8tkIk0SwMGFiIEFjktpGgeNyBAacXQEA8etQbcmVc_A 2024-12-08 06:56:02,872:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "*.daisuke-design.pl"\n },\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-12-08 06:56:02,878:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicU02Q05mcS04dGtJazBTd01HRmlJRUZqa3RwR2dlTnlCQWFjWFFFQThldFFiY21WY19BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "stauiXAOWfbzP3ErY3fn96v3FkY09vqeKYyu4Fx0t3aw0KuUljwedJ-uH6fqS2o3d2QgzAxvITJhh6mmDkV6QUWmihF-U6oEh-IA-YLf0zceCCIgyEfevbB3CPcU0aE56V_1ZxeQeBBQ6378Qjg1pc0RBzoAeLOBkkeyd3kLeVXLqwIntNKBqdBTBrlKYBxr9928-vfI61l6l6SnuTxfCFh0-NZ5xhRxJUkerCFcp4FfpEdRHDcoZ4i_075lvyha9ItdqaWJVH83Nr7owCTLVM6Sm_4w9aORNxkjq3Ehe7RusBLLvpq2AOLRBU-PL0Bgkyrl2-JdHtDy3-jG4hPPDg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIiouZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-12-08 06:56:03,073:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 495 2024-12-08 06:56:03,074:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 08 Dec 2024 05:55:54 GMT Content-Type: application/json Content-Length: 495 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/331029957647 Replay-Nonce: qM6CNfq-jI8qq-1tQxAoxIsc_HYOmJJmnPtuOKAiHgpzswIJ4Ks X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-12-15T05:55:54Z", "identifiers": [ { "type": "dns", "value": "*.daisuke-design.pl" }, { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386094387", "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/441628581957" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/331029957647" } 2024-12-08 06:56:03,074:DEBUG:acme.client:Storing nonce: qM6CNfq-jI8qq-1tQxAoxIsc_HYOmJJmnPtuOKAiHgpzswIJ4Ks 2024-12-08 06:56:03,074:DEBUG:acme.client:JWS payload: b'' 2024-12-08 06:56:03,080:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386094387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicU02Q05mcS1qSThxcS0xdFF4QW94SXNjX0hZT21KSm1uUHR1T0tBaUhncHpzd0lKNEtzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYwOTQzODcifQ", "signature": "GRstChi-IJGjMEJ--tBUwWeJC3n1G_ZwS50q2bhzMArn8c0aqC_rMKKckOxDPWZQa_4XYb4r06dicHjPpAAty-Wa1svv392c81oJiLdcO4yTAZ9vjdx181xzKludSPlAo6Wiggh4j6rhBJT83FX3sqHLtH2mefufiesYiJwd0CYX0A-fyh8G918sv9daotM5UMTUf7hlUlTevH1S0JkLwCq5SSENTtxTGlSsjDozFj3CZCVDjN1gYoFSp_KtFXtVQP2GTR1jpOMU9EZRUo9LMsbiMO5J6wNQs-u8hgFTOW9tqNeKNZhjlHVTUWvGdSvnCN6-Ot2JUCO0A41_OdqgqQ", "payload": "" } 2024-12-08 06:56:03,244:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386094387 HTTP/1.1" 200 776 2024-12-08 06:56:03,245:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 08 Dec 2024 05:55:54 GMT Content-Type: application/json Content-Length: 776 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: MMy3dIC6av8PcWiCK79cQ0bhheGsTWrfO23llDCvUALcMvMka2w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "valid", "expires": "2024-12-23T20:11:49Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/C_-m4Q", "status": "valid", "validated": "2024-11-23T20:11:38Z", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE", "validationRecord": [ { "url": "http://daisuke-design.pl/.well-known/acme-challenge/EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE", "hostname": "daisuke-design.pl", "port": "80", "addressesResolved": [ "109.173.194.211" ], "addressUsed": "109.173.194.211" } ] } ] } 2024-12-08 06:56:03,245:DEBUG:acme.client:Storing nonce: MMy3dIC6av8PcWiCK79cQ0bhheGsTWrfO23llDCvUALcMvMka2w 2024-12-08 06:56:03,246:DEBUG:acme.client:JWS payload: b'' 2024-12-08 06:56:03,252:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/441628581957: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiTU15M2RJQzZhdjhQY1dpQ0s3OWNRMGJoaGVHc1RXcmZPMjNsbERDdlVBTGNNdk1rYTJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NDE2Mjg1ODE5NTcifQ", "signature": "Jrqb4SNwGg4LNXJGoEmSR-HoTmWp3lagI9FWpHgbxjUcPpkRGpnLfoVQUIUhkdtV_6UBrnSZ8-jVYDBV6G_iZTV9GEmmAX_iKohjbWfjr_YqW7Swse3fkZwhEhXncoVpzx-kjSqzLNqyQemZFa9axYmARKUCMQ8Z1z6F7onvzk_16NIvwBdYCGBXmhaA768qYz56eYeFvE4SzwLtlMA_edsG1GjZ3p_loT5Dyhz93Jpc7rOebCfYk_BJ96yWcrgGIuqR4-8KOMZPYF0yYVkSUfPdly7LsgeUS_bvGGSekP5y8d3joI9uz602HhA15mvZcOgYFKBWP9okQc84hqwuFA", "payload": "" } 2024-12-08 06:56:03,416:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/441628581957 HTTP/1.1" 200 397 2024-12-08 06:56:03,417:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 08 Dec 2024 05:55:54 GMT Content-Type: application/json Content-Length: 397 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qM6CNfq-VNkzEPedg4oPiQjyx4uvH80ANxeKJ7GVD3Ob6GnWICA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-12-15T05:55:54Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/441628581957/SgHr1w", "status": "pending", "token": "UNjO1VpPfIhFph3q_2rGoJlTqlJVYjjrA3j0IoAwXfo" } ], "wildcard": true } 2024-12-08 06:56:03,417:DEBUG:acme.client:Storing nonce: qM6CNfq-VNkzEPedg4oPiQjyx4uvH80ANxeKJ7GVD3Ob6GnWICA 2024-12-08 06:56:03,417:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-12-08 06:56:03,418:CRITICAL:certbot._internal.auth_handler:Client with the currently selected authenticator does not support any combination of challenges that will satisfy the CA. You may need to use an authenticator plugin that can do challenges over DNS. 2024-12-08 06:56:03,418:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1237, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 62, in handle_authorizations achalls = self._choose_challenges(authzrs) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 207, in _choose_challenges combinations) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 319, in gen_challenge_path return _find_smart_path(challbs, preferences, combinations) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 355, in _find_smart_path _report_no_chall_path(challbs) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 394, in _report_no_chall_path raise errors.AuthorizationError(msg) certbot.errors.AuthorizationError: Client with the currently selected authenticator does not support any combination of challenges that will satisfy the CA. You may need to use an authenticator plugin that can do challenges over DNS. 2024-12-08 06:56:03,427:ERROR:certbot._internal.log:Client with the currently selected authenticator does not support any combination of challenges that will satisfy the CA. You may need to use an authenticator plugin that can do challenges over DNS.