I made too many certificated by accident, how to fix it?

You should be able to upload all of it as a text file.

I really don't see anything that stands out [yet].

2 Likes

From what i see, the certificate on the website is trying i sgetting new ones without my intervention.
Could certbot be trying to do it on its own because its running on the server?
How can i know where does it come from?

last without errors:

2023-05-07 13:52:32,736:DEBUG:certbot._internal.main:certbot version: 2.0.0
2023-05-07 13:52:32,737:DEBUG:certbot._internal.main:Location of certbot entry point: C:\Program Files\Certbot\bin\certbot.exe
2023-05-07 13:52:32,737:DEBUG:certbot._internal.main:Arguments: ['--preconfigured-renewal']
2023-05-07 13:52:32,737:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2023-05-07 13:52:32,952:DEBUG:certbot._internal.log:Root logging level set at 30
2023-05-07 13:52:32,960:DEBUG:certbot._internal.display.obj:Notifying user: Processing C:\Certbot\renewal\nimoweb.ddns.net.conf
2023-05-07 13:52:33,062:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x0000020C88FE4280> and installer <certbot._internal.cli.cli_utils._Default object at 0x0000020C88FE4280>
2023-05-07 13:52:33,124:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-05-07 13:52:33,288:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-05-07 13:52:33,290:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\nimoweb.ddns.net\cert1.pem is signed by the certificate's issuer.
2023-05-07 13:52:33,294:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\nimoweb.ddns.net\cert1.pem is: OCSPCertStatus.GOOD
2023-05-07 13:52:33,302:DEBUG:certbot._internal.display.obj:Notifying user: Certificate not yet due for renewal
2023-05-07 13:52:33,305:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-05-07 13:52:33,305:DEBUG:certbot._internal.display.obj:Notifying user: 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2023-05-07 13:52:33,306:DEBUG:certbot._internal.display.obj:Notifying user: The following certificates are not due for renewal yet:
2023-05-07 13:52:33,307:DEBUG:certbot._internal.display.obj:Notifying user:   C:\Certbot\live\nimoweb.ddns.net\fullchain.pem expires on 2023-06-06 (skipped)
2023-05-07 13:52:33,308:DEBUG:certbot._internal.display.obj:Notifying user: No renewals were attempted.
2023-05-07 13:52:33,308:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2023-05-07 13:52:33,309:DEBUG:certbot._internal.renewal:no renewal failures

first with error

2023-05-08 07:16:36,445:DEBUG:certbot._internal.main:certbot version: 2.0.0
2023-05-08 07:16:36,446:DEBUG:certbot._internal.main:Location of certbot entry point: C:\Program Files\Certbot\bin\certbot.exe
2023-05-08 07:16:36,446:DEBUG:certbot._internal.main:Arguments: ['--preconfigured-renewal']
2023-05-08 07:16:36,446:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2023-05-08 07:16:36,700:DEBUG:certbot._internal.log:Root logging level set at 30
2023-05-08 07:16:36,711:DEBUG:certbot._internal.display.obj:Notifying user: Processing C:\Certbot\renewal\nimoweb.ddns.net.conf
2023-05-08 07:16:36,820:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x0000024AC0C131C0> and installer <certbot._internal.cli.cli_utils._Default object at 0x0000024AC0C131C0>
2023-05-08 07:16:36,893:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-05-08 07:16:37,063:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-05-08 07:16:37,067:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\nimoweb.ddns.net\cert1.pem is signed by the certificate's issuer.
2023-05-08 07:16:37,071:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\nimoweb.ddns.net\cert1.pem is: OCSPCertStatus.GOOD
2023-05-08 07:16:37,081:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-06-06 15:52:44 UTC.
2023-05-08 07:16:37,081:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing...
2023-05-08 07:16:37,082:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-05-08 07:16:37,091:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: Authenticator, Plugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0000024AC0BE81F0>
Prep: True
2023-05-08 07:16:37,092:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0000024AC0BE81F0> and installer None
2023-05-08 07:16:37,093:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-05-08 07:16:37,272:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/1000009477', new_authzr_uri=None, terms_of_service=None), e0bf52c62f3bcc2f61877600c2f9b13f, Meta(creation_dt=datetime.datetime(2023, 3, 8, 16, 51, 37, tzinfo=<UTC>), creation_host='PineapplePizza', register_to_eff=None))>
2023-05-08 07:16:37,329:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-05-08 07:16:37,333:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-05-08 07:16:37,810:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 756
2023-05-08 07:16:37,811:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 08 May 2023 05:16:37 GMT
Content-Type: application/json
Content-Length: 756
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "dKwjylbre3U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-05-08 07:16:37,814:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for nimoweb.ddns.net and 2 more domains
2023-05-08 07:16:37,824:DEBUG:certbot.crypto_util:Generating ECDSA key (2048 bits): C:\Certbot\keys\0001_key-certbot.pem
2023-05-08 07:16:37,833:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\0001_csr-certbot.pem
2023-05-08 07:16:37,835:DEBUG:acme.client:Requesting fresh nonce
2023-05-08 07:16:37,835:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-05-08 07:16:37,995:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-05-08 07:16:37,996:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 08 May 2023 05:16:37 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4397KMI-ZuttJpARLi2BBjfRTKN4fzyfJw4Azj_cak_BBXM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-05-08 07:16:37,996:DEBUG:acme.client:Storing nonce: 4397KMI-ZuttJpARLi2BBjfRTKN4fzyfJw4Azj_cak_BBXM
2023-05-08 07:16:37,997:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "nimoweb.ddns.net"\n    },\n    {\n      "type": "dns",\n      "value": "foxxo.ddns.net"\n    },\n    {\n      "type": "dns",\n      "value": "lagoona.ddns.net"\n    }\n  ]\n}'
2023-05-08 07:16:38,001:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAwMDAwOTQ3NyIsICJub25jZSI6ICI0Mzk3S01JLVp1dHRKcEFSTGkyQkJqZlJUS040Znp5Zkp3NEF6al9jYWtfQkJYTSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0",
  "signature": "c6mSfLlfEVsjHYwnlkvigfX0vuD1cpC31I1s2ItmkosY9WpdbfD81v3yAI7JAxSsjjxLYnRT50kKhv3yrUQ6_epsOy3JWHL_84pP1tOzR_5ZrxYp_4JFGBc7xsFu6SK3KDXWIviPAv4zC5Qnr7lPCHzVBvK4UH6W0upjutRkG1FMxUX2RGgGdkHSWoGAepe5VtNU6yre9wDwtLFPMilV6tF-eFGb02LYAH-oOaaQCDp9366F7WvKv-RJGoHdp9IYJtbB2fedJ-hpFc94sXQr0sFaX9hjAXGwgFSYv7LQRT3nDOaKumC7vpInoveLsODIBuDzWEVdxdCavF_-248klw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm5pbW93ZWIuZGRucy5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiZm94eG8uZGRucy5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAibGFnb29uYS5kZG5zLm5ldCIKICAgIH0KICBdCn0"
}
2023-05-08 07:16:38,193:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 618
2023-05-08 07:16:38,194:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 08 May 2023 05:16:38 GMT
Content-Type: application/json
Content-Length: 618
Connection: keep-alive
Boulder-Requester: 1000009477
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/1000009477/180851458817
Replay-Nonce: 2712pKQIdcaAQjOfG2uRG0yfCmsjwxUV4YZgcXlLkAJyvpg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-05-15T05:16:38Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "foxxo.ddns.net"
    },
    {
      "type": "dns",
      "value": "lagoona.ddns.net"
    },
    {
      "type": "dns",
      "value": "nimoweb.ddns.net"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/225941175177",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/225941175187",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/225941175197"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1000009477/180851458817"
}
2023-05-08 07:16:38,195:DEBUG:acme.client:Storing nonce: 2712pKQIdcaAQjOfG2uRG0yfCmsjwxUV4YZgcXlLkAJyvpg
2023-05-08 07:16:38,196:DEBUG:acme.client:JWS payload:
b''
2023-05-08 07:16:38,197:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/225941175177:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAwMDAwOTQ3NyIsICJub25jZSI6ICIyNzEycEtRSWRjYUFRak9mRzJ1UkcweWZDbXNqd3hVVjRZWmdjWGxMa0FKeXZwZyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjI1OTQxMTc1MTc3In0",
  "signature": "JrKqL3vKZQ3Wk1NZg6SzJdw1E8fmwzzssZdRWfaMioQrnJ2DCE5Ckle21h9FMRDaHQnsS4mMUx1YkBc-QPnG-WrCPeNrgh2epx970jat2x85gQFrrfwMMiaM0rtzdjINVyChMyhwWsOZIR14hZmFndzc8m0BPjED-DL0KTMSsfZh0TxCxwMC8l9nx9B_n_54-IgetHa21acnQYfgyD0TKe3kd2eNbz7vuODSvNjCrurIlKrYmx01sQzLTakLzUqDFQnz--KC121HEth-LhHRntVGIUjDAlzmf1jVj3gvyL2iC6dweFOeZ9MUGiLfozPM9xH8VW3Tikr7VTT_rmPBrQ",
  "payload": ""
}
2023-05-08 07:16:38,359:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/225941175177 HTTP/1.1" 200 798
2023-05-08 07:16:38,361:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 08 May 2023 05:16:38 GMT
Content-Type: application/json
Content-Length: 798
Connection: keep-alive
Boulder-Requester: 1000009477
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2712ZML_QShNtP1An4oBsCqN2Rsp6PiMH8xN6A-ow1AHPUs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "foxxo.ddns.net"
  },
  "status": "pending",
  "expires": "2023-05-15T05:16:38Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/225941175177/ZTWRvQ",
      "token": "MKTdj8UaGzRrORtWw0G4XEwXZLV7yMqXeDeDF73yypA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/225941175177/AGF8PA",
      "token": "MKTdj8UaGzRrORtWw0G4XEwXZLV7yMqXeDeDF73yypA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/225941175177/IknUXw",
      "token": "MKTdj8UaGzRrORtWw0G4XEwXZLV7yMqXeDeDF73yypA"
    }
  ]
}
2023-05-08 07:16:38,361:DEBUG:acme.client:Storing nonce: 2712ZML_QShNtP1An4oBsCqN2Rsp6PiMH8xN6A-ow1AHPUs
2023-05-08 07:16:38,362:DEBUG:acme.client:JWS payload:
b''
2023-05-08 07:16:38,364:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/225941175187:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAwMDAwOTQ3NyIsICJub25jZSI6ICIyNzEyWk1MX1FTaE50UDFBbjRvQnNDcU4yUnNwNlBpTUg4eE42QS1vdzFBSFBVcyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjI1OTQxMTc1MTg3In0",
  "signature": "TWy4SDiw06G4PB8FGRl2CH5fQFbna5CK9AnqBv4NY48-MUYXpCTBJx97HeiIOYNubHwJUmLtr50_lnXTqAbNfiftMH8wszDRgoAbyfphi2Pq-_Sz8eTYRAFyS3ygXcIz1wXksEbogiUkseVpqkkUg6E1kqP2s4VxmKu3z93z-pgAEHVy58COjVAvKUhKjfxM9ZhGW9WSgNCLULWGGJi3R29Ar3o4SeK4brhdedKW6OHg-R_-aHESdVMh6wrlNCTK51odOdsOU0w2R5m1w6u95SVTMi8xhV6xGIIkJC8akVGe1Aypwnptm95IITgd5F9kvoyoa4APoWinRSMXER1yLg",
  "payload": ""
}
2023-05-08 07:16:38,528:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/225941175187 HTTP/1.1" 200 800
2023-05-08 07:16:38,529:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 08 May 2023 05:16:38 GMT
Content-Type: application/json
Content-Length: 800
Connection: keep-alive
Boulder-Requester: 1000009477
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4397mGwr9hpsYVwFFbwZrkM-1djsUTDwy40HXmb0Em6yXnQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "lagoona.ddns.net"
  },
  "status": "pending",
  "expires": "2023-05-15T05:16:38Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/225941175187/hNiOSg",
      "token": "Dhb6ZlbTq_4KouHP-aiPnKmjvYt2obVvZIofG7_vbr0"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/225941175187/llTsGA",
      "token": "Dhb6ZlbTq_4KouHP-aiPnKmjvYt2obVvZIofG7_vbr0"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/225941175187/HRA1wA",
      "token": "Dhb6ZlbTq_4KouHP-aiPnKmjvYt2obVvZIofG7_vbr0"
    }
  ]
}
2023-05-08 07:16:38,529:DEBUG:acme.client:Storing nonce: 4397mGwr9hpsYVwFFbwZrkM-1djsUTDwy40HXmb0Em6yXnQ
2023-05-08 07:16:38,530:DEBUG:acme.client:JWS payload:
b''
2023-05-08 07:16:38,532:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/225941175197:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAwMDAwOTQ3NyIsICJub25jZSI6ICI0Mzk3bUd3cjlocHNZVndGRmJ3WnJrTS0xZGpzVVREd3k0MEhYbWIwRW02eVhuUSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjI1OTQxMTc1MTk3In0",
  "signature": "E27g9HxAWrq6d8cSa_HIazGl2caPo5RMVb2jC9QUNy-Yz5r6YowhVJU-11B8veic47v0whJYyFtO7KkNVVmZ5155NtOiDmi0rcVODHLDb8jO0IT68hdofohcXM8DZ180JwEkVRQp1WWY4_7KlaQEYeOD41psgZXsJfZyOtcSpTFCstUR577GhaLI5VhL6diK1q7SJ_PQkQW8LILIPGnPxCZwQL1xJ2BAwVwFmY9nDCL4V-88GH8dSOXZlh6f_ynFE6w4dzIY7lwl1fsSP2Y6feBk0ttHHE9KmQ4P8DGfun7z1h3QG61gitb44_7_OuDFa8hxLWYQovYPlMKBjgLm7w",
  "payload": ""
}
2023-05-08 07:16:38,694:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/225941175197 HTTP/1.1" 200 800
2023-05-08 07:16:38,695:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 08 May 2023 05:16:38 GMT
Content-Type: application/json
Content-Length: 800
Connection: keep-alive
Boulder-Requester: 1000009477
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 2712JmT2IgiSGeWnEUKsDbbTJiDFPqzfPhtjSdDN3kheY5s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "nimoweb.ddns.net"
  },
  "status": "pending",
  "expires": "2023-05-15T05:16:38Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/225941175197/X2S_HA",
      "token": "GlbU6DQ-dH6zoaaR2nhGTS0O2p8FJH3dGzUCBdtldgA"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/225941175197/TIlefQ",
      "token": "GlbU6DQ-dH6zoaaR2nhGTS0O2p8FJH3dGzUCBdtldgA"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/225941175197/DvcvjA",
      "token": "GlbU6DQ-dH6zoaaR2nhGTS0O2p8FJH3dGzUCBdtldgA"
    }
  ]
}
2023-05-08 07:16:38,695:DEBUG:acme.client:Storing nonce: 2712JmT2IgiSGeWnEUKsDbbTJiDFPqzfPhtjSdDN3kheY5s
2023-05-08 07:16:38,696:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-05-08 07:16:38,697:INFO:certbot._internal.auth_handler:http-01 challenge for foxxo.ddns.net
2023-05-08 07:16:38,697:INFO:certbot._internal.auth_handler:http-01 challenge for lagoona.ddns.net
2023-05-08 07:16:38,697:INFO:certbot._internal.auth_handler:http-01 challenge for nimoweb.ddns.net
2023-05-08 07:16:38,698:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2023-05-08 07:16:38,698:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2023-05-08 07:16:38,744:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 79, in run
    servers = acme_standalone.HTTP01DualNetworkedServers(
  File "C:\Program Files\Certbot\pkgs\acme\standalone.py", line 219, in __init__
    super().__init__(HTTP01Server, *args, **kwargs)
  File "C:\Program Files\Certbot\pkgs\acme\standalone.py", line 122, in __init__
    raise last_socket_err
  File "C:\Program Files\Certbot\pkgs\acme\standalone.py", line 97, in __init__
    server = ServerClass(*new_args, **kwargs)
  File "C:\Program Files\Certbot\pkgs\acme\standalone.py", line 209, in __init__
    super().__init__(
  File "C:\Program Files\Certbot\pkgs\acme\standalone.py", line 201, in __init__
    super().__init__(*args, **kwargs)
  File "socketserver.py", line 452, in __init__
  File "http\server.py", line 136, in server_bind
  File "socketserver.py", line 466, in server_bind
OSError: [WinError 10013] An attempt was made to access a socket in a way forbidden by its access permissions

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\auth_handler.py", line 86, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 162, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 162, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 170, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 226, in _handle_perform_error
    raise error
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 168, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 174, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 183, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 82, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: [WinError 10013] An attempt was made to access a socket in a way forbidden by its access permissions

2023-05-08 07:16:38,744:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-05-08 07:16:38,745:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-05-08 07:16:38,745:ERROR:certbot._internal.renewal:Failed to renew certificate nimoweb.ddns.net with error: Problem binding to port 80: [WinError 10013] An attempt was made to access a socket in a way forbidden by its access permissions
2023-05-08 07:16:38,806:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 79, in run
    servers = acme_standalone.HTTP01DualNetworkedServers(
  File "C:\Program Files\Certbot\pkgs\acme\standalone.py", line 219, in __init__
    super().__init__(HTTP01Server, *args, **kwargs)
  File "C:\Program Files\Certbot\pkgs\acme\standalone.py", line 122, in __init__
    raise last_socket_err
  File "C:\Program Files\Certbot\pkgs\acme\standalone.py", line 97, in __init__
    server = ServerClass(*new_args, **kwargs)
  File "C:\Program Files\Certbot\pkgs\acme\standalone.py", line 209, in __init__
    super().__init__(
  File "C:\Program Files\Certbot\pkgs\acme\standalone.py", line 201, in __init__
    super().__init__(*args, **kwargs)
  File "socketserver.py", line 452, in __init__
  File "http\server.py", line 136, in server_bind
  File "socketserver.py", line 466, in server_bind
OSError: [WinError 10013] An attempt was made to access a socket in a way forbidden by its access permissions

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\renewal.py", line 524, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 1540, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 126, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\renewal.py", line 387, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\client.py", line 428, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\client.py", line 496, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\auth_handler.py", line 86, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 162, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 162, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 170, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 226, in _handle_perform_error
    raise error
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 168, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 174, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 183, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 82, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: [WinError 10013] An attempt was made to access a socket in a way forbidden by its access permissions

2023-05-08 07:16:38,806:DEBUG:certbot._internal.display.obj:Notifying user: 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2023-05-08 07:16:38,807:ERROR:certbot._internal.renewal:All renewals failed. The following certificates could not be renewed:
2023-05-08 07:16:38,808:ERROR:certbot._internal.renewal:  C:\Certbot\live\nimoweb.ddns.net\fullchain.pem (failure)
2023-05-08 07:16:38,809:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2023-05-08 07:16:38,810:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "runpy.py", line 197, in _run_module_as_main
  File "runpy.py", line 87, in _run_code
  File "C:\Program Files\Certbot\bin\certbot.exe\__main__.py", line 29, in <module>
    sys.exit(main())
  File "C:\Program Files\Certbot\pkgs\certbot\main.py", line 19, in main
    return internal_main.main(cli_args)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 1736, in main
    return config.func(config, plugins)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 1629, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\renewal.py", line 550, in handle_renewal_request
    raise errors.Error(
certbot.errors.Error: 1 renew failure(s), 0 parse failure(s)
2023-05-08 07:16:38,824:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)

I think i figured it out
CertBot console was open for those months its malfuncitoning ever now and then trying to issue a certificate.
I closed it 24h ago, and finally no new (failed) attempts.
SO... i will wait few more days, and reattempt.
wish me luck

So, i tried again today

C:\Program Files\Certbot>
                         certbot renew -v
Saving debug log to C:\Certbot\log\letsencrypt.log

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Processing C:\Certbot\renewal\foxxo.ddns.net.conf
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Certificate not yet due for renewal

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Processing C:\Certbot\renewal\lagoona.ddns.net.conf
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Certificate not yet due for renewal

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Processing C:\Certbot\renewal\nimoweb.ddns.net.conf
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Certificate is due for renewal, auto-renewing...
Plugins selected: Authenticator standalone, Installer None
Renewing an existing certificate for nimoweb.ddns.net
Performing the following challenges:
http-01 challenge for nimoweb.ddns.net
Cleaning up challenges
Failed to renew certificate nimoweb.ddns.net with error: Problem binding to port 80: [WinError 10013] An attempt was made to access a socket in a way forbidden by its access permissions

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The following certificates are not due for renewal yet:
  C:\Certbot\live\foxxo.ddns.net\fullchain.pem expires on 2023-12-09 (skipped)
  C:\Certbot\live\lagoona.ddns.net\fullchain.pem expires on 2023-12-09 (skipped)
All renewals failed. The following certificates could not be renewed:
  C:\Certbot\live\nimoweb.ddns.net\fullchain.pem (failure)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
1 renew failure(s), 0 parse failure(s)
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile C:\Certbot\log\letsencrypt.log or re-run Certbot with -v for more details.

C:\Program Files\Certbot>certbot renew -v
Saving debug log to C:\Certbot\log\letsencrypt.log

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Processing C:\Certbot\renewal\foxxo.ddns.net.conf
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Certificate not yet due for renewal

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Processing C:\Certbot\renewal\lagoona.ddns.net.conf
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Certificate not yet due for renewal

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Processing C:\Certbot\renewal\nimoweb.ddns.net.conf
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Certificate is due for renewal, auto-renewing...
Plugins selected: Authenticator standalone, Installer None
Renewing an existing certificate for nimoweb.ddns.net
Performing the following challenges:
http-01 challenge for nimoweb.ddns.net
Waiting for verification...
Cleaning up challenges
Failed to renew certificate nimoweb.ddns.net with error: [Errno 17] The file exists.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The following certificates are not due for renewal yet:
  C:\Certbot\live\foxxo.ddns.net\fullchain.pem expires on 2023-12-09 (skipped)
  C:\Certbot\live\lagoona.ddns.net\fullchain.pem expires on 2023-12-09 (skipped)
All renewals failed. The following certificates could not be renewed:
  C:\Certbot\live\nimoweb.ddns.net\fullchain.pem (failure)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
1 renew failure(s), 0 parse failure(s)
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile C:\Certbot\log\letsencrypt.log or re-run Certbot with -v for more details.

C:\Program Files\Certbot>
2023-10-11 17:51:26,111:DEBUG:certbot._internal.main:certbot version: 2.0.0
2023-10-11 17:51:26,111:DEBUG:certbot._internal.main:Location of certbot entry point: C:\Program Files\Certbot\bin\certbot.exe
2023-10-11 17:51:26,111:DEBUG:certbot._internal.main:Arguments: ['-v', '--preconfigured-renewal']
2023-10-11 17:51:26,111:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2023-10-11 17:51:26,562:DEBUG:certbot._internal.log:Root logging level set at 20
2023-10-11 17:51:26,572:DEBUG:certbot._internal.display.obj:Notifying user: Processing C:\Certbot\renewal\foxxo.ddns.net.conf
2023-10-11 17:51:26,651:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x0000015AE06E5160> and installer <certbot._internal.cli.cli_utils._Default object at 0x0000015AE06E5160>
2023-10-11 17:51:26,686:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-10-11 17:51:26,709:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-10-11 17:51:26,711:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\foxxo.ddns.net\cert2.pem is signed by the certificate's issuer.
2023-10-11 17:51:26,713:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\foxxo.ddns.net\cert2.pem is: OCSPCertStatus.GOOD
2023-10-11 17:51:26,718:DEBUG:certbot._internal.display.obj:Notifying user: Certificate not yet due for renewal
2023-10-11 17:51:26,723:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-10-11 17:51:26,723:DEBUG:certbot._internal.display.obj:Notifying user: Processing C:\Certbot\renewal\lagoona.ddns.net.conf
2023-10-11 17:51:26,756:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-10-11 17:51:26,782:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-10-11 17:51:26,786:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\lagoona.ddns.net\cert2.pem is signed by the certificate's issuer.
2023-10-11 17:51:26,788:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\lagoona.ddns.net\cert2.pem is: OCSPCertStatus.GOOD
2023-10-11 17:51:26,791:DEBUG:certbot._internal.display.obj:Notifying user: Certificate not yet due for renewal
2023-10-11 17:51:26,795:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-10-11 17:51:26,796:DEBUG:certbot._internal.display.obj:Notifying user: Processing C:\Certbot\renewal\nimoweb.ddns.net.conf
2023-10-11 17:51:26,830:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-09-05 10:53:50 UTC.
2023-10-11 17:51:26,830:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing...
2023-10-11 17:51:26,832:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2023-10-11 17:51:26,835:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: Authenticator, Plugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0000015AE06B8A30>
Prep: True
2023-10-11 17:51:26,836:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0000015AE06B8A30> and installer None
2023-10-11 17:51:26,837:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-10-11 17:51:26,916:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/1000009477', new_authzr_uri=None, terms_of_service=None), e0bf52c62f3bcc2f61877600c2f9b13f, Meta(creation_dt=datetime.datetime(2023, 3, 8, 16, 51, 37, tzinfo=<UTC>), creation_host='PineapplePizza', register_to_eff=None))>
2023-10-11 17:51:26,946:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2023-10-11 17:51:26,948:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2023-10-11 17:51:27,439:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752
2023-10-11 17:51:27,440:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Oct 2023 15:51:27 GMT
Content-Type: application/json
Content-Length: 752
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "aJlbqf8Pa8s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-10-11 17:51:27,444:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for nimoweb.ddns.net
2023-10-11 17:51:27,792:DEBUG:certbot.crypto_util:Generating ECDSA key (2048 bits): C:\Certbot\keys\0355_key-certbot.pem
2023-10-11 17:51:28,123:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\0355_csr-certbot.pem
2023-10-11 17:51:28,125:DEBUG:acme.client:Requesting fresh nonce
2023-10-11 17:51:28,126:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2023-10-11 17:51:28,290:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-10-11 17:51:28,291:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Oct 2023 15:51:28 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: _s_5u1NQ1VFSFtTJxyoIUOzN2qn6f_c6eEbYOxu469WehxJgZLE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2023-10-11 17:51:28,292:DEBUG:acme.client:Storing nonce: _s_5u1NQ1VFSFtTJxyoIUOzN2qn6f_c6eEbYOxu469WehxJgZLE
2023-10-11 17:51:28,293:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "nimoweb.ddns.net"\n    }\n  ]\n}'
2023-10-11 17:51:28,297:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAwMDAwOTQ3NyIsICJub25jZSI6ICJfc181dTFOUTFWRlNGdFRKeHlvSVVPek4ycW42Zl9jNmVFYllPeHU0NjlXZWh4SmdaTEUiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9",
  "signature": "iNkcZoSKhs8SjKRGCWDv8LGToZHZgnGNfka_jvHn2zE8uyENEkdgGkCO6izFbmReOHYChWBcZD7c0A_3-0JSk-doOvvb-uJWA5iq_ER7LsnipNVGNfM2rKLrW6kWYo7s3qvfjs0UaudO-M5EHGi-f2DzJ7pUaD54iHLDRbsYrV8ZuK-8vTe_PAFOZjnZZkbj6owGt4umJCyAOQMgl_dVV3k47AngDxS-3ChNs9QnFFlaG5npfsCiIQRZSW8UDQrBhftosFVd-QmTlWddMsGuh2y5cHsCV6uqorMiqTU3CO5opeG3hUYSLgiloYb5PHWE0CJtJm3iha0ep3egGzpncQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm5pbW93ZWIuZGRucy5uZXQiCiAgICB9CiAgXQp9"
}
2023-10-11 17:51:28,485:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 342
2023-10-11 17:51:28,486:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 11 Oct 2023 15:51:28 GMT
Content-Type: application/json
Content-Length: 342
Connection: keep-alive
Boulder-Requester: 1000009477
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/1000009477/214101059316
Replay-Nonce: _s_5u1NQOXhBp9d8MbWqCL1Y3p7SGxPtoi4JNmrPWm2JnQnl3cI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2023-10-17T09:53:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "nimoweb.ddns.net"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/272490218136"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1000009477/214101059316"
}
2023-10-11 17:51:28,487:DEBUG:acme.client:Storing nonce: _s_5u1NQOXhBp9d8MbWqCL1Y3p7SGxPtoi4JNmrPWm2JnQnl3cI
2023-10-11 17:51:28,487:DEBUG:acme.client:JWS payload:
b''
2023-10-11 17:51:28,490:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/272490218136:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAwMDAwOTQ3NyIsICJub25jZSI6ICJfc181dTFOUU9YaEJwOWQ4TWJXcUNMMVkzcDdTR3hQdG9pNEpObXJQV20ySm5RbmwzY0kiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzI3MjQ5MDIxODEzNiJ9",
  "signature": "c3Vlq1bgjblkJN_G95tcKXt-s5VgmL-CAl2c4BtivKd6Fm9HgcoQq1FEfm5npOlkqgkndqFH8sZNN9FiWENvCXo_BMT0u60JF2pbMXlxGToT8MjPWuILtaoGZ1FItTnj4A3z4NvVr77o9h62jZTr3TpSaF7etZ91IWQps4IZRRO0Tmnt7JLgxHshHP2SgIxElhxQy370e_-vx-M0hVmxSG-55lbqpVo0cMSMsTMlM6CGcQ14Z7af5lOJpAjKawEpVE0IlVd7pC6NjvIEBfFqb96S8Gfah3NbISAT4-jnUnxBlMG03I5dYp7_93ZVTyDk8Knkl-qU0F5vspuIJCI2_Q",
  "payload": ""
}
2023-10-11 17:51:28,660:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/272490218136 HTTP/1.1" 200 800
2023-10-11 17:51:28,662:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Oct 2023 15:51:28 GMT
Content-Type: application/json
Content-Length: 800
Connection: keep-alive
Boulder-Requester: 1000009477
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: _s_5u1NQw8nEhPLVW6uPLAU0kdzpBKZ5MavSGQdi8YdiqTGZ3QE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "nimoweb.ddns.net"
  },
  "status": "pending",
  "expires": "2023-10-17T09:53:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/272490218136/-GJmQg",
      "token": "m2CG7suED-TIYtVwPfT0ikjRKQmXGBI9gNBWzFLjpLI"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/272490218136/8ku_ZQ",
      "token": "m2CG7suED-TIYtVwPfT0ikjRKQmXGBI9gNBWzFLjpLI"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/272490218136/0AyajA",
      "token": "m2CG7suED-TIYtVwPfT0ikjRKQmXGBI9gNBWzFLjpLI"
    }
  ]
}
2023-10-11 17:51:28,662:DEBUG:acme.client:Storing nonce: _s_5u1NQw8nEhPLVW6uPLAU0kdzpBKZ5MavSGQdi8YdiqTGZ3QE
2023-10-11 17:51:28,663:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-10-11 17:51:28,664:INFO:certbot._internal.auth_handler:http-01 challenge for nimoweb.ddns.net
2023-10-11 17:51:28,674:DEBUG:acme.standalone:Successfully bound to :80 using IPv6
2023-10-11 17:51:28,676:DEBUG:acme.standalone:Successfully bound to :80 using IPv4
2023-10-11 17:51:28,680:DEBUG:acme.client:JWS payload:
b'{}'
2023-10-11 17:51:28,682:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/272490218136/-GJmQg:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAwMDAwOTQ3NyIsICJub25jZSI6ICJfc181dTFOUXc4bkVoUExWVzZ1UExBVTBrZHpwQktaNU1hdlNHUWRpOFlkaXFUR1ozUUUiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzI3MjQ5MDIxODEzNi8tR0ptUWcifQ",
  "signature": "e8ONMVq7_Fvphv0Mn6nRLVa5O0VjmaxTEnoDgpX6NIo3MhOMLxz_zmNgaB8fvVdmDKvA1iYUh3mO6xCtFfMBkoImzfNqDFV2QNCr6HrN3gu4q-JXkvgOJ2ipJqtBKbB37yF_ez8fOBpix62PKcJHb6AT3Sj9fSBI-aQCczuH6iypKd_SN1pO8_H_utNnEi_lzur172DRzGK2DxTcVoZgjB8QqKmPCYBlPbcKbScrEo0aUelU7cF985HlG8x14VbbSyt6qWJTJvAe3A-k9nJ27N2rCYdS_E3BXkNj9ZDDOlKnHvnI6BCCkL9TGqsoo4LzIOEUGyqBlSveXcyAj2omqg",
  "payload": "e30"
}
2023-10-11 17:51:28,850:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/272490218136/-GJmQg HTTP/1.1" 200 187
2023-10-11 17:51:28,851:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Oct 2023 15:51:28 GMT
Content-Type: application/json
Content-Length: 187
Connection: keep-alive
Boulder-Requester: 1000009477
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz-v3/272490218136>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/272490218136/-GJmQg
Replay-Nonce: IAvmRRVVU3t_2Kiw-OELKorsRJmId88doAowgQmxySJJqz6Q1LM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "type": "http-01",
  "status": "pending",
  "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/272490218136/-GJmQg",
  "token": "m2CG7suED-TIYtVwPfT0ikjRKQmXGBI9gNBWzFLjpLI"
}
2023-10-11 17:51:28,852:DEBUG:acme.client:Storing nonce: IAvmRRVVU3t_2Kiw-OELKorsRJmId88doAowgQmxySJJqz6Q1LM
2023-10-11 17:51:28,852:INFO:certbot._internal.auth_handler:Waiting for verification...
2023-10-11 17:51:29,149:DEBUG:acme.standalone:18.221.32.160 - - Incoming request
2023-10-11 17:51:29,150:DEBUG:acme.standalone:18.221.32.160 - - Serving HTTP01 with token 'm2CG7suED-TIYtVwPfT0ikjRKQmXGBI9gNBWzFLjpLI'
2023-10-11 17:51:29,150:DEBUG:acme.standalone:18.221.32.160 - - "GET /.well-known/acme-challenge/m2CG7suED-TIYtVwPfT0ikjRKQmXGBI9gNBWzFLjpLI HTTP/1.1" 200 -
2023-10-11 17:51:29,219:DEBUG:acme.standalone:34.209.8.250 - - Incoming request
2023-10-11 17:51:29,220:DEBUG:acme.standalone:34.209.8.250 - - Serving HTTP01 with token 'm2CG7suED-TIYtVwPfT0ikjRKQmXGBI9gNBWzFLjpLI'
2023-10-11 17:51:29,220:DEBUG:acme.standalone:34.209.8.250 - - "GET /.well-known/acme-challenge/m2CG7suED-TIYtVwPfT0ikjRKQmXGBI9gNBWzFLjpLI HTTP/1.1" 200 -
2023-10-11 17:51:29,250:DEBUG:acme.standalone:23.178.112.103 - - Incoming request
2023-10-11 17:51:29,251:DEBUG:acme.standalone:23.178.112.103 - - Serving HTTP01 with token 'm2CG7suED-TIYtVwPfT0ikjRKQmXGBI9gNBWzFLjpLI'
2023-10-11 17:51:29,252:DEBUG:acme.standalone:23.178.112.103 - - "GET /.well-known/acme-challenge/m2CG7suED-TIYtVwPfT0ikjRKQmXGBI9gNBWzFLjpLI HTTP/1.1" 200 -
2023-10-11 17:51:29,853:DEBUG:acme.client:JWS payload:
b''
2023-10-11 17:51:29,855:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/272490218136:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAwMDAwOTQ3NyIsICJub25jZSI6ICJJQXZtUlJWVlUzdF8yS2l3LU9FTEtvcnNSSm1JZDg4ZG9Bb3dnUW14eVNKSnF6NlExTE0iLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzI3MjQ5MDIxODEzNiJ9",
  "signature": "B6b07XaC-qJt8tgItnLOWHxFC5xxKsN9VY9B3LtwUl3CX4sm5byWrRatb-Kfo6MywwzeZ2i7E_L_M9KHenNUyW8yQF4lFnbrKC21d3b2pFcyPml5_n8L9iiMfoIyuTkvvWcGqgNSW4GgtaOxOWi5wYJT4GcnZEkWVfkgLZCkx9-IV41H-nDQI8fG6bDEw7N1yBMIsz8lzd7V_BEZ3u1kOV6jEqMl1yZJfytXPXAAvwjjaxRhPor3b_gCaD4aTbzLGjwNbwoXUAe9xAObycTIM3Sf_QdUAbuidmG-ZmJOR0OFlnA-1YSkkErydJ9X23BWumdsGocFPfJ7y4sZ-BD-Sg",
  "payload": ""
}
2023-10-11 17:51:30,024:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/272490218136 HTTP/1.1" 200 767
2023-10-11 17:51:30,025:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Oct 2023 15:51:29 GMT
Content-Type: application/json
Content-Length: 767
Connection: keep-alive
Boulder-Requester: 1000009477
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: IAvmRRVVXQcHFLvFsqpJDVJd5cikHaEQQEbp9ULxwmMdlJ6ixpI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "nimoweb.ddns.net"
  },
  "status": "valid",
  "expires": "2023-11-10T15:51:29Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "valid",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/272490218136/-GJmQg",
      "token": "m2CG7suED-TIYtVwPfT0ikjRKQmXGBI9gNBWzFLjpLI",
      "validationRecord": [
        {
          "url": "http://nimoweb.ddns.net/.well-known/acme-challenge/m2CG7suED-TIYtVwPfT0ikjRKQmXGBI9gNBWzFLjpLI",
          "hostname": "nimoweb.ddns.net",
          "port": "80",
          "addressesResolved": [
            "173.212.216.164"
          ],
          "addressUsed": "173.212.216.164"
        }
      ],
      "validated": "2023-10-11T15:51:28Z"
    }
  ]
}
2023-10-11 17:51:30,026:DEBUG:acme.client:Storing nonce: IAvmRRVVXQcHFLvFsqpJDVJd5cikHaEQQEbp9ULxwmMdlJ6ixpI
2023-10-11 17:51:30,027:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-10-11 17:51:30,027:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-10-11 17:51:30,028:DEBUG:certbot._internal.plugins.standalone:Stopping server at :::80...
2023-10-11 17:51:30,029:DEBUG:certbot._internal.plugins.standalone:Stopping server at 0.0.0.0:80...
2023-10-11 17:51:30,253:DEBUG:certbot._internal.client:CSR: CSR(file='C:\\Certbot\\csr\\0355_csr-certbot.pem', data=b'-----BEGIN CERTIFICATE REQUEST-----\nMIHoMIGQAgEAMAAwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQroUJy7LlluYC3\nOI5spbR3ToMMpfoUaZvzHPSpfAZfqRyaj98gabLT/Do4Sk6L70srNLzZA2eLoamq\nyHiCq9f7oC4wLAYJKoZIhvcNAQkOMR8wHTAbBgNVHREEFDASghBuaW1vd2ViLmRk\nbnMubmV0MAoGCCqGSM49BAMCA0cAMEQCICSGGfhTNssmy9LWKxxQlEtrqIe1cBzh\nWZkLvhpzXblqAiAfjvyNjzvzXsmSw3vy6vSuweq235xsigcdlRGXYukCvA==\n-----END CERTIFICATE REQUEST-----\n', form='pem')
2023-10-11 17:51:30,255:DEBUG:certbot._internal.client:Will poll for certificate issuance until 2023-10-11 17:53:00.254291
2023-10-11 17:51:30,256:DEBUG:acme.client:JWS payload:
b'{\n  "csr": "MIHoMIGQAgEAMAAwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQroUJy7LlluYC3OI5spbR3ToMMpfoUaZvzHPSpfAZfqRyaj98gabLT_Do4Sk6L70srNLzZA2eLoamqyHiCq9f7oC4wLAYJKoZIhvcNAQkOMR8wHTAbBgNVHREEFDASghBuaW1vd2ViLmRkbnMubmV0MAoGCCqGSM49BAMCA0cAMEQCICSGGfhTNssmy9LWKxxQlEtrqIe1cBzhWZkLvhpzXblqAiAfjvyNjzvzXsmSw3vy6vSuweq235xsigcdlRGXYukCvA"\n}'
2023-10-11 17:51:30,258:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/finalize/1000009477/214101059316:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAwMDAwOTQ3NyIsICJub25jZSI6ICJJQXZtUlJWVlhRY0hGTHZGc3FwSkRWSmQ1Y2lrSGFFUVFFYnA5VUx4d21NZGxKNml4cEkiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2ZpbmFsaXplLzEwMDAwMDk0NzcvMjE0MTAxMDU5MzE2In0",
  "signature": "KesiP7mcWsS9lGOv_srKbii3zsoi84H7_JxRr_i-1pmYn79trbrp9hShIOOD6bXFVsajT9nzTyp-I0H-srcZ-4oMVOuwB74LEoHz9NF_maWJBodlhHNxXQGfwTQVd6w1qeJ0XrHnR7O38g8-dsAdeZC55Ii3jTJTRgCDIofaYP-5FUuX_1fHnc7ARhU9zPb7OWw85LM-eDL1V3l8XomsuQo__BZzE-_wpiDvuxSm26jsZ0oe7QVr2_qCFw4GfTQizUycDfzq0NRaH_xeQgB2Uu8f7LO7r8b7_gBNqfYtoNgVR7RW5SU731iQ2Jg4X6RgUy831HdfRNsZrCxkBAL8cg",
  "payload": "ewogICJjc3IiOiAiTUlIb01JR1FBZ0VBTUFBd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFRcm9VSnk3TGxsdVlDM09JNXNwYlIzVG9NTXBmb1VhWnZ6SFBTcGZBWmZxUnlhajk4Z2FiTFRfRG80U2s2TDcwc3JOTHpaQTJlTG9hbXF5SGlDcTlmN29DNHdMQVlKS29aSWh2Y05BUWtPTVI4d0hUQWJCZ05WSFJFRUZEQVNnaEJ1YVcxdmQyVmlMbVJrYm5NdWJtVjBNQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJQ1NHR2ZoVE5zc215OUxXS3h4UWxFdHJxSWUxY0J6aFdaa0x2aHB6WGJscUFpQWZqdnlOanp2elhzbVN3M3Z5NnZTdXdlcTIzNXhzaWdjZGxSR1hZdWtDdkEiCn0"
}
2023-10-11 17:51:31,089:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/finalize/1000009477/214101059316 HTTP/1.1" 200 444
2023-10-11 17:51:31,090:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Oct 2023 15:51:31 GMT
Content-Type: application/json
Content-Length: 444
Connection: keep-alive
Boulder-Requester: 1000009477
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/1000009477/214101059316
Replay-Nonce: _s_5u1NQDDeu9wQQgrhnneNFr1zUMRIVhCgPX2bOkMJmvDTNIqg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "valid",
  "expires": "2023-10-17T09:53:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "nimoweb.ddns.net"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/272490218136"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1000009477/214101059316",
  "certificate": "https://acme-v02.api.letsencrypt.org/acme/cert/03e9f6f9200206b3007b9c296170dd630773"
}
2023-10-11 17:51:31,091:DEBUG:acme.client:Storing nonce: _s_5u1NQDDeu9wQQgrhnneNFr1zUMRIVhCgPX2bOkMJmvDTNIqg
2023-10-11 17:51:32,091:DEBUG:acme.client:JWS payload:
b''
2023-10-11 17:51:32,094:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/order/1000009477/214101059316:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAwMDAwOTQ3NyIsICJub25jZSI6ICJfc181dTFOUUREZXU5d1FRZ3Jobm5lTkZyMXpVTVJJVmhDZ1BYMmJPa01KbXZEVE5JcWciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL29yZGVyLzEwMDAwMDk0NzcvMjE0MTAxMDU5MzE2In0",
  "signature": "DYIwZvPJ3B2kSc6fDgNk2z5_Y2B5D4f-_vbP7HJcP9dQ6YHcCFUbtogOWNnh_Ayr-ME0c0VU69DyPqn12hMjplZ_f0gWPHK7VvnJ2bewFEzzCuXHTX9BZwZZr2V8majD5qAUxOM6Zq3sQ1X0_VviXUhgqXs_iEmqi0nyhz9v_vUprOl6-PwCvQcXM4MKuKKKqpmfO0P4RdW6do_ENmNZIlM455filg17grLTR0tHDo8MhxzVLowbpp4SkQTvrQdfbt0sGqfcTAq_DGk35B7loGj2Z1UT7xx8ABqkTTNWFTXOvDIB4csPOxZO6uSBV_h_ctWARaJl-SDh5jBedGA3_A",
  "payload": ""
}
2023-10-11 17:51:32,264:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/order/1000009477/214101059316 HTTP/1.1" 200 444
2023-10-11 17:51:32,265:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Oct 2023 15:51:32 GMT
Content-Type: application/json
Content-Length: 444
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: IAvmRRVV7O7wixscJuZbInYtax5A_tMBdSpM5Z84-UhRXSXaYY8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "valid",
  "expires": "2023-10-17T09:53:25Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "nimoweb.ddns.net"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/272490218136"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1000009477/214101059316",
  "certificate": "https://acme-v02.api.letsencrypt.org/acme/cert/03e9f6f9200206b3007b9c296170dd630773"
}
2023-10-11 17:51:32,266:DEBUG:acme.client:Storing nonce: IAvmRRVV7O7wixscJuZbInYtax5A_tMBdSpM5Z84-UhRXSXaYY8
2023-10-11 17:51:32,267:DEBUG:acme.client:JWS payload:
b''
2023-10-11 17:51:32,269:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/cert/03e9f6f9200206b3007b9c296170dd630773:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAwMDAwOTQ3NyIsICJub25jZSI6ICJJQXZtUlJWVjdPN3dpeHNjSnVaYkluWXRheDVBX3RNQmRTcE01Wjg0LVVoUlhTWGFZWTgiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NlcnQvMDNlOWY2ZjkyMDAyMDZiMzAwN2I5YzI5NjE3MGRkNjMwNzczIn0",
  "signature": "n_FZSzOHWKKHd2_vX43FPhM-_8vvnUFytX-BO6hRBIRjxmSDMk-K9jDgD3GNE1t4WO8dG17eRmAGo6VK8a50iUUJtKvJkRz2DmuVXthulfN-wzozBjLK9NjacgXhSx1StfBidGZ2oJgqFP0B-qnKNv9Q34t6b7kT5aS13GDK8NCmUQ6xDWdaW_3F12MSQ5vuO_XDZ_XZSucZeHryM-iKSih7KUEu18wrnEIcBFUL-mKmHRA84wKpFwveV9xKYAquAmSvwUYsLoHsrJnAp4JIzlDCAc8UXIVwr7nbeXC3jibGOf_eOGfvKMiH4tsrHhUW9Le1KUGt0usIvabnEeWZRg",
  "payload": ""
}
2023-10-11 17:51:32,439:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/cert/03e9f6f9200206b3007b9c296170dd630773 HTTP/1.1" 200 5244
2023-10-11 17:51:32,441:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 11 Oct 2023 15:51:32 GMT
Content-Type: application/pem-certificate-chain
Content-Length: 5244
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/cert/03e9f6f9200206b3007b9c296170dd630773/1>;rel="alternate"
Replay-Nonce: IAvmRRVVKUzl3WOZATokcznwOErfYJPrHrLU2U0rceUwPKZv7p8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

2023-10-11 17:51:32,442:DEBUG:acme.client:Storing nonce: IAvmRRVVKUzl3WOZATokcznwOErfYJPrHrLU2U0rceUwPKZv7p8
2023-10-11 17:51:32,453:ERROR:certbot._internal.renewal:Failed to renew certificate nimoweb.ddns.net with error: [Errno 17] The file exists.
2023-10-11 17:51:32,524:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files\Certbot\pkgs\certbot\compat\filesystem.py", line 256, in open
    handle = win32file.CreateFile(file_path, win32file.GENERIC_READ,
pywintypes.error: (80, 'CreateFile', 'The file exists.')

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\renewal.py", line 524, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 1540, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 126, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\renewal.py", line 393, in renew_cert
    lineage.save_successor(prior_version, new_cert, new_key.pem, new_chain, config)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\storage.py", line 1219, in save_successor
    with util.safe_open(target["privkey"], "wb", chmod=BASE_PRIVKEY_MODE) as f:
  File "C:\Program Files\Certbot\pkgs\certbot\util.py", line 225, in safe_open
    fd = filesystem.open(path, os.O_CREAT | os.O_EXCL | os.O_RDWR, *open_args)
  File "C:\Program Files\Certbot\pkgs\certbot\compat\filesystem.py", line 263, in open
    raise OSError(errno.EEXIST, err.strerror)
FileExistsError: [Errno 17] The file exists.

2023-10-11 17:51:32,528:DEBUG:certbot._internal.display.obj:Notifying user: 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2023-10-11 17:51:32,530:DEBUG:certbot._internal.display.obj:Notifying user: The following certificates are not due for renewal yet:
2023-10-11 17:51:32,533:DEBUG:certbot._internal.display.obj:Notifying user:   C:\Certbot\live\foxxo.ddns.net\fullchain.pem expires on 2023-12-09 (skipped)
  C:\Certbot\live\lagoona.ddns.net\fullchain.pem expires on 2023-12-09 (skipped)
2023-10-11 17:51:32,535:ERROR:certbot._internal.renewal:All renewals failed. The following certificates could not be renewed:
2023-10-11 17:51:32,536:ERROR:certbot._internal.renewal:  C:\Certbot\live\nimoweb.ddns.net\fullchain.pem (failure)
2023-10-11 17:51:32,538:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2023-10-11 17:51:32,539:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "runpy.py", line 197, in _run_module_as_main
  File "runpy.py", line 87, in _run_code
  File "C:\Program Files\Certbot\bin\certbot.exe\__main__.py", line 29, in <module>
    sys.exit(main())
  File "C:\Program Files\Certbot\pkgs\certbot\main.py", line 19, in main
    return internal_main.main(cli_args)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 1736, in main
    return config.func(config, plugins)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\main.py", line 1629, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files\Certbot\pkgs\certbot\_internal\renewal.py", line 550, in handle_renewal_request
    raise errors.Error(
certbot.errors.Error: 1 renew failure(s), 0 parse failure(s)
2023-10-11 17:51:32,540:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)



The good news is that the cert was renewed:

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

The bad news is that it isn't able to be saved to disk:

2023-10-11 17:51:32,453:ERROR:certbot._internal.renewal:Failed to renew certificate nimoweb.ddns.net with error: [Errno 17] The file exists.

The problem seems to be that nimoweb.ddns.net and nimoweb.ddns.net-0001 have been scrambled together:

As you can see above, the symlinks from one are pointing to the other.

3 Likes

That's weird, this issue used to happen a bunch on Unix but hasn't been common for the past couple of years. (I don't know if anyone ever explicitly figured out what would cause it; I assume it was a result of some kind of manual tampering with the symlink or directory names, but there must have been a recurrent issue that caused this specific outcome.)

I think this is the first time I've seen someone with this specific issue on Windows, and the first time I've seen the issue in about three years.

1 Like

(Also, a common symptom of the symlink-confusion issue on Unix used to be that people's renewal certificates wouldn't get saved properly, or wouldn't get noticed properly by Certbot, sometimes leading to hitting rate limits.)

1 Like

If you're interested in an alternative way to do this you could consider Certify The Web (https://certifytheweb.com) which I develop. The reason I suggest that is your problems seem to be centered around Windows file permission and symlinks, which are avoidable with an alternative client and in this case the client is built specifically for Windows (usually for IIS but it can be used with Apache).

To do the same using Certify The Web, with "standalone" equivalent, or alternatively using the "webroot" method:

Getting a Cert

  • Make sure nothing is currently using port 80 (e.g. apache)
  • Use New Certificate to setup a new managed certificate, add your domains, click Request Certificate to try getting a cert. See Requesting a Certificate | Certify The Web Docs - If that all works proceed to deployment.

To alternatively use a "webroot" method instead (serving the http challenge via apache instead of using the http challenge server built into the client), set an output path for the challenge response files pointing to the root structure of your site, under Authorization > Http > Site Root Directory. Ensure that extensionless files written into /.well-known/acme-challenge/ can be browsed to over http. You can use "Test' to check if challenges are being served ok.

Deployment
Once you have your cert you can use a deployment task to place the cert files where you want them (e.g. C:\certs\nimoweb.ddns.net) and restart apache.

You normally would set the fullchain.pem path and privkey.pem path, then save and hit :arrow_forward:Play next to the task to try it out. This should give you the output file you need in the location you want. You then just need to point your apache config at the right files. You can refine this task configuration and test the task without re-requesting a whole new certificate.

You would normally need a Deploy to Apache task and a Stop/Start/Restart service task (for apache).

Once you have these setup your subsequent renewals will be automatic.

The benefit of separating the process of getting your cert and deploying it is that you can troubleshoot them individually.

[Edit: I've updated our docs for Apache/nginx deployment : Using with Apache, nginx or Other Web Servers | Certify The Web Docs for future reference]

4 Likes

Why is there a nimoweb.ddns.net-0001 ?
shoudl i maybe remove it so the syslink-confussion goes away?

I would remove both nimos and start over.

3 Likes

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.