2024-11-23 04:46:55,154:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-11-23 04:46:55,155:DEBUG:certbot._internal.main:Arguments: [] 2024-11-23 04:46:55,155:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-23 04:46:55,924:DEBUG:certbot._internal.log:Root logging level set at 20 2024-11-23 04:46:55,924:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-11-23 04:46:55,969:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-11-23 04:46:56,013:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-23 04:46:56,212:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:46:56,213:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-11-23 04:46:56,228:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-11-23 04:46:56,237:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:06 UTC. 2024-11-23 04:46:56,237:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:46:56,237:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:46:56,242:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:46:56,243:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:46:56,243:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:46:56,249:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:46:56,250:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:46:56,253:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:46:56,758:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:46:56,759:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:46:57 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6mIWba5OUx0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-23 04:46:56,759:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:47:03,212:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8781_key-certbot.pem 2024-11-23 04:47:09,574:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8779_csr-certbot.pem 2024-11-23 04:47:09,575:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:47:09,575:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:47:09,736:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:47:09,736:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:47:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgTWOE1z8bHUWRu09UoRaCijGmLEqt1Kc0jI70ofns4nOQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:47:09,736:DEBUG:acme.client:Storing nonce: eYk8fkgTWOE1z8bHUWRu09UoRaCijGmLEqt1Kc0jI70ofns4nOQ 2024-11-23 04:47:09,737:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:47:09,743:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RXT0UxejhiSFVXUnUwOVVvUmFDaWpHbUxFcXQxS2Mwakk3MG9mbnM0bk9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EBCX5o_jzozxC7I5USP2kC2a8sPenYIkf_9nXdppzL9vtJoWM_ZRFb8qvQKZLyElBK55w7l9t_zW6-ijUa52jy14dmtWLEP5Y_Exe--9PziEId0g8SLg7PC7wYR77ZC5mCfzOKfIuvGBoR0V-tyDXlkXxB95pfK7jtBDjXbHiKlQADb6AkNBL9pnnzHTL9arZRIi_Q9KM-YNIYCtDMz0f7goyq2y8qhoFPb4e5zkTiF8IN7J5lLIg0Ozu67-bz_Fn4EJMQVSbH2tT_55JK6aVEUjMQ-T2MOQs6tNrnqcEreIKes4hezaD7mF6ApljPWYiRSWe7EIbq1XkwgSfXD7lA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-23 04:47:09,934:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2024-11-23 04:47:09,935:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:47:10 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335168147 Replay-Nonce: eYk8fkgTzVxfFedUjFnTAPJokCHqN0WyIfTSUBozNQWNyzYRgBA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:30:42Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385871837" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335168147" } 2024-11-23 04:47:09,935:DEBUG:acme.client:Storing nonce: eYk8fkgTzVxfFedUjFnTAPJokCHqN0WyIfTSUBozNQWNyzYRgBA 2024-11-23 04:47:09,935:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:47:09,942:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385871837: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1R6VnhmRmVkVWpGblRBUEpva0NIcU4wV3lJZlRTVUJvek5RV055ellSZ0JBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODU4NzE4MzcifQ", "signature": "KlrelkAotmC2t8VUMQwkHY78wYT_nnhqcjaj7TKwwtNgm2hpta8XhyAHkoZMzmALe6TmpUtNsCcXZiUo0iiFIXxCVSdfNL3tW6WKfEShGAS7LxPgwMylq1DAhemyjcIXtY9sDBCA99e9PoZMLbx6zQsFiKPb-xVjR2kUB0NRV0CmLosaFd8yUM6kMbg9niwM2JENHsebELPRtCdk3j6EsWr_f6byBK5Do4qD6HOqZYQOQEp4p6qHuINFS2y5wCG4g0bv7aPHBxg11o2KA7KZNEHVifr6lZGfSTXe6l0IV3CH_0P5Zi5jTbnIOruZgarfDnctsR2ej1nk9Bv5IYwE8g", "payload": "" } 2024-11-23 04:47:10,109:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433385871837 HTTP/1.1" 200 828 2024-11-23 04:47:10,110:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:47:10 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgT2R67_MPzN0dJUpVTmxuiM2Ah0zfyYH01ith28anaYZU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:30:42Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385871837/lzGNtw", "status": "pending", "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385871837/08KxfQ", "status": "pending", "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385871837/UndPAg", "status": "pending", "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg" } ] } 2024-11-23 04:47:10,110:DEBUG:acme.client:Storing nonce: eYk8fkgT2R67_MPzN0dJUpVTmxuiM2Ah0zfyYH01ith28anaYZU 2024-11-23 04:47:10,110:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:47:10,111:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-11-23 04:47:10,122:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:47:10,122:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:47:10,125:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:47:10,126:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:47:10,126:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:47:10,126:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:47:10,131:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:47:10,171:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-23 04:47:10,375:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:47:10,376:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-23 04:47:10,377:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-23 04:47:10,383:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:27 UTC. 2024-11-23 04:47:10,383:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:47:10,383:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:47:10,389:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:47:10,389:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:47:10,389:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:47:10,394:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:47:10,395:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:47:10,397:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:47:10,873:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:47:10,874:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:47:11 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VSl9-PH_ohI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-23 04:47:10,874:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:47:17,371:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8782_key-certbot.pem 2024-11-23 04:47:23,300:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8780_csr-certbot.pem 2024-11-23 04:47:23,301:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:47:23,301:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:47:23,460:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:47:23,461:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:47:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgT2lDgv-U150KdRu_2CuVdl04HKVQgOj8O1K4hv8_rprM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:47:23,461:DEBUG:acme.client:Storing nonce: eYk8fkgT2lDgv-U150KdRu_2CuVdl04HKVQgOj8O1K4hv8_rprM 2024-11-23 04:47:23,461:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:47:23,468:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1QybERndi1VMTUwS2RSdV8yQ3VWZGwwNEhLVlFnT2o4TzFLNGh2OF9ycHJNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BRNC_2HgDdPi_x5T0JImG7ls65ROX6OG5QSYf_KfVX3ejRuUOq50vfmQ_FRX1xSdbiDkrVsjmIveP31wwfzDhW9VavlIEeMvwtJ2mKJXFfH6qclzQVn4LZ_UE8yWXG1lXhgu6uUHbXcJg8qIhwrF30zeDJdYbGEXyr2exnhjRVy4l6e2v9nS6-ImIqwz0iezQUsIjosYXDBiEGYtrlUMmnkhIzQZelgv0n4YXfkQsVzAMEbbCwAwSIhCyahQGj1SKY70b5N07X8N_6XqUdxJK4l8yS79x3eFI4CVAP_MWL82GEWDCzTUrGFIukc80bbo2QZSiZimKiEhyMIkm7NztQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-23 04:47:23,656:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-23 04:47:23,657:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:47:23 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335212297 Replay-Nonce: FVNV6H0M3323hHwsYfaSzqKCTDwyu5Gp7cTJ3Ypph0KRcurUP0c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:30:55Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385936637" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335212297" } 2024-11-23 04:47:23,657:DEBUG:acme.client:Storing nonce: FVNV6H0M3323hHwsYfaSzqKCTDwyu5Gp7cTJ3Ypph0KRcurUP0c 2024-11-23 04:47:23,657:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:47:23,663:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385936637: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME0zMzIzaEh3c1lmYVN6cUtDVER3eXU1R3A3Y1RKM1lwcGgwS1JjdXJVUDBjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODU5MzY2MzcifQ", "signature": "olNu8hbyoxvZsrBxEc2P6dctOHNzWmd223biZIJzoYGX1IxFO-GCv2kBZOjGJEFMMoxmoyvYbYNS5-oEWnO1tOAcz7u974XrH_lRQBn6c5ID4P8GNvs6EpTc9rIgeMJz9MPe3hl7_DchcBdNzm_brP0uT0N76z1FAWG2aikwrHRWYK_rFSxikOsgzKH7L8C_l8aWGW4TIveqa8X_Gv7PctnzDqj_BxuyT1weq7IaPymGpsDipRj-OFF5JF7SjquIJnY_dcNqu_by6wcXUgNeK2Qlcs8OG_miR9N0ii6umRMc7V0-MmTS4DfPze7jT6AKmYYCAwdcI-8IsHg3o8wXNQ", "payload": "" } 2024-11-23 04:47:23,830:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433385936637 HTTP/1.1" 200 822 2024-11-23 04:47:23,831:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:47:24 GMT Content-Type: application/json Content-Length: 822 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FVNV6H0MBxKWv8KxGHd3tDHKPPzGYkPHBS0kQmRiDrRfLn55ZSk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:30:55Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385936637/UMKluQ", "status": "pending", "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385936637/bnCyvA", "status": "pending", "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385936637/Q-td3A", "status": "pending", "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I" } ] } 2024-11-23 04:47:23,831:DEBUG:acme.client:Storing nonce: FVNV6H0MBxKWv8KxGHd3tDHKPPzGYkPHBS0kQmRiDrRfLn55ZSk 2024-11-23 04:47:23,832:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:47:23,832:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-11-23 04:47:23,833:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:47:23,833:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:47:23,834:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:47:23,834:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:47:23,834:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:47:23,835:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:47:23,836:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:47:23,891:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-23 04:47:24,088:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:47:24,089:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-23 04:47:24,090:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-23 04:47:24,095:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:47 UTC. 2024-11-23 04:47:24,095:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:47:24,096:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:47:24,101:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:47:24,101:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:47:24,101:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:47:24,106:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:47:24,107:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:47:24,109:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:47:24,582:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:47:24,582:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:47:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "DZi8a9-olp4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-23 04:47:24,583:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:47:31,197:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8783_key-certbot.pem 2024-11-23 04:47:37,263:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8781_csr-certbot.pem 2024-11-23 04:47:37,263:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:47:37,263:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:47:37,421:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:47:37,422:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:47:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgTgzI79tsSMh7BZETFGADynhQKfRO8Iym5quZ6W4DbRnk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:47:37,422:DEBUG:acme.client:Storing nonce: eYk8fkgTgzI79tsSMh7BZETFGADynhQKfRO8Iym5quZ6W4DbRnk 2024-11-23 04:47:37,422:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:47:37,429:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1Rnekk3OXRzU01oN0JaRVRGR0FEeW5oUUtmUk84SXltNXF1WjZXNERiUm5rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "GucnvEjxXxt0uL4fJb50GDLxWP_jHkvIyBKuTbPVDq9JYT2NBPtQZ0U0YPQbXZei2-J14XeugPR_frMFM-tcLkzT6exf1TLhehpvfsfRgtZgSWJiVzQzjFqq03Q8ZnNW6Qy9bQLj-kYJ0uXwv6JE6ZGXzoHzWTlyk8I96o15PzrSDfqecQCIDWnLvjDcP7WM-ZCzYKmAxbwTKmFpK9vS6ZtlovkDbFrdVrNJ3kGa3tWLF9GKMw9qZt-z7mEBYBCa2zOrqS7lBiFBV4bslUTJ2XjQfyUx-zQ6FT8oS2hwDYY_w15BmT2z2TmNI73OPmTFykyX7Sk7Rk8uvf7XuWv4vg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-23 04:47:37,674:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2024-11-23 04:47:37,675:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:47:37 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335268447 Replay-Nonce: FVNV6H0MjwWVRIgInKlNKLIZmKJuNB-3CqmcA-QO3r5zZf5ELIw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:08Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386017137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335268447" } 2024-11-23 04:47:37,675:DEBUG:acme.client:Storing nonce: FVNV6H0MjwWVRIgInKlNKLIZmKJuNB-3CqmcA-QO3r5zZf5ELIw 2024-11-23 04:47:37,675:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:47:37,682:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386017137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1qd1dWUklnSW5LbE5LTElabUtKdU5CLTNDcW1jQS1RTzNyNXpaZjVFTEl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYwMTcxMzcifQ", "signature": "DTihftHrfjiyIWkLnmzJABDnQWg4Jyepchr0tErYns7hIHniWnbhelW8MC5AbWwPtLH-EQAP9cEDvIp3eZwgXyijSJJ2JU-7Scp0rBAEdxz6WHO1R5GZsmMQe4xlo4dbog597eppKEum6z23EenfSi5q5Z5U6cDkSObpCMXbiIqxwk8bYhbTPoLyPjp6fHE3KLVl3_V4It4BGMoFmZKLwUWbQOheA0sb6dUl7gbH8YJhMWDg0VfECOkcuPnSAMon4QQAPhaXXwMlafGn7goMp9yTLWQWRLPQ9WexbKhz2PWF4A2RYnAmR0EtX1hJ2AZ3h9IQzL9Fs__wSM8QVNa3ew", "payload": "" } 2024-11-23 04:47:37,846:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386017137 HTTP/1.1" 200 825 2024-11-23 04:47:37,847:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:47:38 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgT5mvx2mAKCLxLny3tyFsLWBqHn-qjZrSZchb0sURVM0E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:08Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386017137/5ns8sQ", "status": "pending", "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386017137/Q2i4ow", "status": "pending", "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386017137/4FswZw", "status": "pending", "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY" } ] } 2024-11-23 04:47:37,847:DEBUG:acme.client:Storing nonce: eYk8fkgT5mvx2mAKCLxLny3tyFsLWBqHn-qjZrSZchb0sURVM0E 2024-11-23 04:47:37,847:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:47:37,848:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-11-23 04:47:37,848:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:47:37,849:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:47:37,849:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:47:37,850:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:47:37,850:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:47:37,850:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:47:37,851:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:47:37,890:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-23 04:47:38,094:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:47:38,095:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-11-23 04:47:38,096:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-11-23 04:47:38,100:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-11-23 04:47:38,104:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:47:38,143:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-23 04:47:38,330:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:47:38,331:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-23 04:47:38,332:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-23 04:47:38,337:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:08 UTC. 2024-11-23 04:47:38,337:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:47:38,337:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:47:38,342:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:47:38,342:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:47:38,343:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:47:38,347:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:47:38,348:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:47:38,350:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:47:38,804:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:47:38,804:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:47:39 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "cHyd0nknM1k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-23 04:47:38,805:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:47:44,944:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8784_key-certbot.pem 2024-11-23 04:47:51,159:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8782_csr-certbot.pem 2024-11-23 04:47:51,159:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:47:51,159:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:47:51,311:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:47:51,312:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:47:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTHY6BHClnVj7RaARcgcmaIpeDHh84jEVEpGDcToD5N_c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:47:51,312:DEBUG:acme.client:Storing nonce: zIaIDaiTHY6BHClnVj7RaARcgcmaIpeDHh84jEVEpGDcToD5N_c 2024-11-23 04:47:51,313:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:47:51,319:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRIWTZCSENsblZqN1JhQVJjZ2NtYUlwZURIaDg0akVWRXBHRGNUb0Q1Tl9jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "LCgACgg84afe8iSRTAyQMVaVin7SMZjLGcAxPc29Xa2nIRzS37-f9PQSsUwqXHvCHiHEL4WWatj49w6oq7eOzNcINWL2gXN9PcTVE66CkKKWmgvzvo6r_8vjMiRxkBIFwOkxrK7JuwZLgqnTsEeWPDbsW_G16zWKRmXZip-ZDwzpZsxFhYi6u3JX3fnvAk-vTDL6VEtAo4iHUA4EnudRwFjMKnuqWvv7123K6VTD8B_engm5NbD9Ksrkdr0Zmpkya5qz0-fLZMV54RZqyn_ZknFWrXDEJ_2nMHwHPKM7H6-on_C0Bx2qLo11WC6kyv8sBgWsWe0vsJm9yKiRAaK1IQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-23 04:47:51,573:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-23 04:47:51,574:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:47:51 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335319597 Replay-Nonce: zIaIDaiTRQ4UDMSH6DeEB1ay9EdU3P7NROmbzN_jXFdrRLKuNxA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:21Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386094387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335319597" } 2024-11-23 04:47:51,574:DEBUG:acme.client:Storing nonce: zIaIDaiTRQ4UDMSH6DeEB1ay9EdU3P7NROmbzN_jXFdrRLKuNxA 2024-11-23 04:47:51,574:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:47:51,580:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386094387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRSUTRVRE1TSDZEZUVCMWF5OUVkVTNQN05ST21iek5falhGZHJSTEt1TnhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYwOTQzODcifQ", "signature": "Yzk7Oyn9c1rFQl7jVxKDFyNEtHGgAJTn5L5tgiYVRC7jhSWzvXqQurEbieuLHP-Ybuc_WnOgMEspPcjbB6Zas9qoJleG5wthSzzwjxLkVxorx2UyzBshiG2McrQqWPFa3RN4jZ9U7F4h9domBnPGyr91VYFMxYyKQUpRDkdsgrHR3HYRLSD__PmY3tZ-4gjhDDS776QfnsGt90iaEXppEIvAO44mXgC7w6_eUZLm8hnsWjxsDBIbb5m6kF5Wwxx7qTvlw5WwAMacf1lv3gA-MeucM291s5-eNWrZRbLXYjXP16oFqNpOxyXxhIqrRDZ3GQO6l5nggXOq0FZ7k1QUCQ", "payload": "" } 2024-11-23 04:47:51,741:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386094387 HTTP/1.1" 200 819 2024-11-23 04:47:51,742:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:47:52 GMT Content-Type: application/json Content-Length: 819 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gtp33icHg5rmgjKtLwZ6icUWZ1_FDyWFKowxO7UIMr6onc58mss X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:21Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/GfKRvQ", "status": "pending", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/C_-m4Q", "status": "pending", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/-o13Yw", "status": "pending", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE" } ] } 2024-11-23 04:47:51,742:DEBUG:acme.client:Storing nonce: gtp33icHg5rmgjKtLwZ6icUWZ1_FDyWFKowxO7UIMr6onc58mss 2024-11-23 04:47:51,743:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:47:51,743:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-11-23 04:47:51,744:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:47:51,744:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:47:51,745:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:47:51,745:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:47:51,746:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:47:51,746:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:47:51,747:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:47:51,801:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-23 04:47:51,986:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:47:51,987:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-23 04:47:51,988:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-23 04:47:51,993:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:27 UTC. 2024-11-23 04:47:51,993:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:47:51,993:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:47:51,998:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:47:51,998:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:47:51,998:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:47:52,004:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:47:52,005:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:47:52,007:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:47:52,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:47:52,462:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:47:52 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "rNBAjNCdN30": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-23 04:47:52,463:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:47:58,606:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8785_key-certbot.pem 2024-11-23 04:48:04,626:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8783_csr-certbot.pem 2024-11-23 04:48:04,627:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:48:04,627:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:48:04,779:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:48:04,780:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:48:05 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gtp33icHNcHCvjn8tPgH_blClk7SZiszXgnJwGm-AMaIZcyOU-o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:48:04,780:DEBUG:acme.client:Storing nonce: gtp33icHNcHCvjn8tPgH_blClk7SZiszXgnJwGm-AMaIZcyOU-o 2024-11-23 04:48:04,780:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:48:04,787:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0hOY0hDdmpuOHRQZ0hfYmxDbGs3U1ppc3pYZ25Kd0dtLUFNYUlaY3lPVS1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jRPik9OmesD13iAOKNSoOLmorFJDe74e-B2GVjVfsKnym9fW5MnG7NDGY5__ot6-dkxi3N-mPajKmJBu1xDK2u_64d8RAslF_45y5iIrAeITtf76uKnsBF4QbXZzn7Yf-lFlbVUAvtTzW980DrwjqgNN_y_yKQGEx3OOFEM734cvCB9lvuoHlR-zBaZMmy6QYB4Axlt73LCTwH5_yGNGfLh-xOjgwU8yYCn0pebtllFaUeo8iCEuXy8OD81kAt6XVtaYFUnVgIZege9SZtqdV5iShO1U8IIm0eMGfItuuJum6MvUUfuGwGiNQw5jaAnptD-t954jHAFA2GjcM7Dp6Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-23 04:48:04,978:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-23 04:48:04,979:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:48:05 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335362247 Replay-Nonce: gtp33icHgx8lApxCJ0fko58d3RiDKZBeaxnBpfjatBGsc8z9C94 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:34Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386161497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335362247" } 2024-11-23 04:48:04,979:DEBUG:acme.client:Storing nonce: gtp33icHgx8lApxCJ0fko58d3RiDKZBeaxnBpfjatBGsc8z9C94 2024-11-23 04:48:04,979:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:48:04,985:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386161497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0hneDhsQXB4Q0owZmtvNThkM1JpREtaQmVheG5CcGZqYXRCR3NjOHo5Qzk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYxNjE0OTcifQ", "signature": "JDequ_fUvpQWLLVB39kqKogtmnFlpAJWDj09Tl-5fsx_b5PPmM7PZZ2rXiNbrBgUyc1s6epyRFa-HmSoU8d1d9HUlRRITHrzfq5aubJk5wSQH3Y8CuYDZ0t__8FSpwajV5yvAfTgG4fjuDrxXOM8wESy95SWNJpk3o5rkaegzwssZLLCo3OBCC2PsSBfDaCDmz3vqZ2hVIQqy3W5vAuh9KiaYzF2S0IsYXSSwduYun3xH4qDYUwQ1BptLULz7iSpGbdmlIb-tMrMUWqIaP8uAsIVYfqj-jMRimzmQE6wF6ZcNDWE3bNXHzelPNY9iESscfFZXAFrHhcI0zC5weRZ3w", "payload": "" } 2024-11-23 04:48:05,146:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386161497 HTTP/1.1" 200 823 2024-11-23 04:48:05,147:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:48:05 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTf6M5xVkwDZjEZRnp_gc7dyN2O7qr6kNpjdAFIa9zFIA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:34Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386161497/G65eQA", "status": "pending", "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386161497/SgjmHQ", "status": "pending", "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386161497/DvhIEA", "status": "pending", "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI" } ] } 2024-11-23 04:48:05,147:DEBUG:acme.client:Storing nonce: zIaIDaiTf6M5xVkwDZjEZRnp_gc7dyN2O7qr6kNpjdAFIa9zFIA 2024-11-23 04:48:05,148:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:48:05,148:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-11-23 04:48:05,149:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:48:05,149:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:48:05,150:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:48:05,150:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:48:05,150:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:48:05,151:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:48:05,152:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:48:05,203:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-23 04:48:05,369:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:48:05,370:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-23 04:48:05,371:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-23 04:48:05,375:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:58 UTC. 2024-11-23 04:48:05,375:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:48:05,375:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:48:05,381:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:48:05,381:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:48:05,381:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:48:05,388:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:48:05,389:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:48:05,392:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:48:05,874:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:48:05,875:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:48:06 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "z2Zbk9AJLz8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-23 04:48:05,875:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:48:12,082:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8786_key-certbot.pem 2024-11-23 04:48:18,576:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8784_csr-certbot.pem 2024-11-23 04:48:18,576:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:48:18,577:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:48:18,739:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:48:18,740:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:48:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgTjfktnzoTOHKr6roVtarbwEYPlW7nvyfEBNxZUmGlOOo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:48:18,740:DEBUG:acme.client:Storing nonce: eYk8fkgTjfktnzoTOHKr6roVtarbwEYPlW7nvyfEBNxZUmGlOOo 2024-11-23 04:48:18,740:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:48:18,747:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RqZmt0bnpvVE9IS3I2cm9WdGFyYndFWVBsVzdudnlmRUJOeFpVbUdsT09vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Z6fJggMfkRu7c29efEOG2xZwZRu6Pq26I8jjCBOGOX3GEv0PPr7cfIgmDhPyS62CqGX9C49RGAs-d_7TbAnONB3i3MAt2hGa206XRYNKGydguwzPOP9PQ1cZDLk7U62_oT8iERejJsA1bi_wIP7QMrtn-uX5JNsH9VjUr643rxnpaUlMhsmRa8uQ-G5YMpb-fX_YqWvwIm9upgPM-9InCDW-8m-lseOfiaiNt_v9zMNsYYkX417XEV73b99MWb50Di8rcJDlLAQHtxNvxINW2DuCT7dsFJdIRCm_-px2rH_poMgKRD2HTz5vj3L9_4_VIch3FAMg6yEdLWSu5fEZhw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-23 04:48:18,957:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2024-11-23 04:48:18,958:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:48:19 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335405237 Replay-Nonce: eYk8fkgTeKZNUb9Y8pY42BroDQtpSNDqAvhCJuAbs4ABIXAxfOc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:47Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386225357" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335405237" } 2024-11-23 04:48:18,959:DEBUG:acme.client:Storing nonce: eYk8fkgTeKZNUb9Y8pY42BroDQtpSNDqAvhCJuAbs4ABIXAxfOc 2024-11-23 04:48:18,959:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:48:18,966:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386225357: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RlS1pOVWI5WThwWTQyQnJvRFF0cFNORHFBdmhDSnVBYnM0QUJJWEF4Zk9jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYyMjUzNTcifQ", "signature": "srAne7ViXe7WaE3gO-CCs6TV9pjKSBx3RRpzo8vulXwU_NJLhYzGAP97B62JF2Ilhajdq3PrzQwsIB5SH2Z_RvGmXu2BJ-AFAZbYSX8L1FswUB1E2TXDPlFcZTPatQNEcD7aQVRbdAK3hJeq0Lx7v3HQkFLmgDRydd9Lm2FspI_xPlRajrD-EfTAXk_kDHtKQeNN53jun7-BWlQpRG6gjvBTnbEp6VgN8RxZ3D6vrCVJPM93GRaFZbrwoswRGMkePb0D4oB_4GhVIQ5t_3tjT8CFs2_WllqRt5MrxZQlF8pkujuZJOuE2l5f4hbj9fu1uymgbp6cwOXuZplmt8DWmg", "payload": "" } 2024-11-23 04:48:19,136:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386225357 HTTP/1.1" 200 827 2024-11-23 04:48:19,137:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:48:19 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgTMPYcYsf04_wyPwM9-m8Jq7konGYenPQfZUEepJv28og X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:47Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386225357/bpWWxw", "status": "pending", "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386225357/ZOgoCA", "status": "pending", "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386225357/rcFeQQ", "status": "pending", "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU" } ] } 2024-11-23 04:48:19,137:DEBUG:acme.client:Storing nonce: eYk8fkgTMPYcYsf04_wyPwM9-m8Jq7konGYenPQfZUEepJv28og 2024-11-23 04:48:19,139:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:48:19,140:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-11-23 04:48:19,140:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:48:19,140:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:48:19,141:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:48:19,141:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:48:19,141:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:48:19,142:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:48:19,144:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:48:19,191:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-23 04:48:19,354:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:48:19,355:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2024-11-23 04:48:19,356:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2024-11-23 04:48:19,360:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:15 UTC. 2024-11-23 04:48:19,361:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:48:19,361:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:48:19,368:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:48:19,368:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:48:19,368:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:48:19,374:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:48:19,375:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:48:19,378:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:48:19,832:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:48:19,832:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:48:20 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1XI_5PhorHM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-23 04:48:19,833:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:48:27,095:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8787_key-certbot.pem 2024-11-23 04:48:33,287:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8785_csr-certbot.pem 2024-11-23 04:48:33,288:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:48:33,288:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:48:33,440:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:48:33,441:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:48:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gtp33icHUxL-T0wN8RqsR2ZoSEM0mlv5ydCoZpM26Up6DkjS4yI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:48:33,441:DEBUG:acme.client:Storing nonce: gtp33icHUxL-T0wN8RqsR2ZoSEM0mlv5ydCoZpM26Up6DkjS4yI 2024-11-23 04:48:33,441:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:48:33,447:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0hVeEwtVDB3TjhScXNSMlpvU0VNMG1sdjV5ZENvWnBNMjZVcDZEa2pTNHlJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iIN4VP1aGkDtOBAb_rJ4q4PJ27_vrtEXtd9FvLvulCDbdKob3RzKLa2MpHKsVVy7A3NShB5Hzz1BHTFi5UOBZvJvl06gJ9tlRY7ukweRceOuI5MfGH9_v8nYcI3WylOVS6EG_hZ1B8W-qxUWKBPXSy5Em7r1la5ULr_2K0s_Eng2L6432iVZ8DdAqVmiTbw2fMdDkYgnIdzlwgDXFrpJy_kJame-qkW2HAx3T4efanCy21Ixypf2rb7LjuoJPUvAzM9bJJxNdLX1oHFtRjVTf1LBts0E4eLHeQovGNPDl623UcveTRe7oFsMpBB0LjwO1QNs6_eTy2ntwZsMCBtQ_Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-23 04:48:33,715:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2024-11-23 04:48:33,716:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:48:34 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335446687 Replay-Nonce: gtp33icHxwEiWL0eoWUVP78hdYN30Fw1vgvxKjTGlPvx14h68zM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:59Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386288977" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335446687" } 2024-11-23 04:48:33,716:DEBUG:acme.client:Storing nonce: gtp33icHxwEiWL0eoWUVP78hdYN30Fw1vgvxKjTGlPvx14h68zM 2024-11-23 04:48:33,716:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:48:33,723:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386288977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0h4d0VpV0wwZW9XVVZQNzhoZFlOMzBGdzF2Z3Z4S2pUR2xQdngxNGg2OHpNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYyODg5NzcifQ", "signature": "Coz3U3YnnzYBjmSnr9Tvj_yL28k4Ct-Om8QXjeYjZQowK_iDTPI9aMmPbAgSsppKTvpo-JluBUiw9BJ9LrpOHnTkUFrPaZtETlRbCleA1cN4Gc5I9_yOuQQYGump01-VIuVU54O0sBFysTxuUJRP1wCxK1Dqm8ltlcw99LboO1h2QcpgfAa8B6HACJwrA7ZFAmNQr6bpdw0MTqkAvv4L3gDV2xiDOsD0vmGA1XI-5-XIPZNg_OreAnbtzAyhJYKO8leWV7j94Jb7iH_l6rBfhN57HODIN8_tFMIN53Exut3hSYoKJaJjuEanzt-zrmTyhxEY44TlwpN0XZ5rmwzElQ", "payload": "" } 2024-11-23 04:48:33,885:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386288977 HTTP/1.1" 200 825 2024-11-23 04:48:33,885:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:48:34 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gtp33icHiugEiEiGjgvq6fnA7L5nMKuN-uEyUMlZIQuLJEIi12Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386288977/jzYzOg", "status": "pending", "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386288977/74HdZw", "status": "pending", "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386288977/qrrE6g", "status": "pending", "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE" } ] } 2024-11-23 04:48:33,885:DEBUG:acme.client:Storing nonce: gtp33icHiugEiEiGjgvq6fnA7L5nMKuN-uEyUMlZIQuLJEIi12Q 2024-11-23 04:48:33,888:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:48:33,888:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-11-23 04:48:33,889:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:48:33,889:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:48:33,890:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:48:33,890:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:48:33,890:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:48:33,891:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:48:33,892:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:48:33,946:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-23 04:48:34,141:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:48:34,143:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-23 04:48:34,144:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-23 04:48:34,151:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:37 UTC. 2024-11-23 04:48:34,151:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:48:34,151:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:48:34,157:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:48:34,157:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:48:34,157:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:48:34,163:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:48:34,163:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:48:34,166:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:48:34,632:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:48:34,633:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:48:34 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "nX90roSEGdM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-23 04:48:34,633:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:48:41,465:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8788_key-certbot.pem 2024-11-23 04:48:48,365:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8786_csr-certbot.pem 2024-11-23 04:48:48,366:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:48:48,366:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:48:48,522:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:48:48,522:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:48:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgTL42-GcSMAMim3Sr0Fx3dA2jpshJqczElzJNhq1S_E5g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:48:48,523:DEBUG:acme.client:Storing nonce: eYk8fkgTL42-GcSMAMim3Sr0Fx3dA2jpshJqczElzJNhq1S_E5g 2024-11-23 04:48:48,523:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:48:48,531:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RMNDItR2NTTUFNaW0zU3IwRngzZEEyanBzaEpxY3pFbHpKTmhxMVNfRTVnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dq1giMrRrCMx748mJPY6j7ywchTOscYrzPBEh9hRmQon84GxpTdAWNV3sv6mug2cCqji490_i0gwikJuPwFL-fwXFf1A2rVNRaWICAbA6mlhBg3FPEAmNNjpuhshTtVKgpVAZGmBUy-w_HhtUJ7FivNddLEHIbXwTOHlgGePoNZHqGuyco6Ati3BI5GW1HGYrKc0IFPscL3v34bVRAIWJuxZ4XaojH1NrgCui5zy4RxMEeprgkjLr9DsXpJ7Nc9GWWCRfh1lv4V_jsXqlnn74v3OZMY3k4egvP3US4rUAgz7sFfjhY7VhjkYL9BV1_H-pvDBo4lBeoR3d9MvJe-s6Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-23 04:48:48,766:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2024-11-23 04:48:48,767:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:48:49 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335505847 Replay-Nonce: FVNV6H0MVbEwH8HfUBTZqIAUqXILXq1wjhuvPXJFfJjmbVE7E4Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:12Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386373457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335505847" } 2024-11-23 04:48:48,767:DEBUG:acme.client:Storing nonce: FVNV6H0MVbEwH8HfUBTZqIAUqXILXq1wjhuvPXJFfJjmbVE7E4Q 2024-11-23 04:48:48,767:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:48:48,774:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386373457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1WYkV3SDhIZlVCVFpxSUFVcVhJTFhxMXdqaHV2UFhKRmZKam1iVkU3RTRRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYzNzM0NTcifQ", "signature": "p0d7H8KOlpeAix507S4S3g3E_Z5zlKcml5AZJeS2-miixmWTpDJfoDK8uXo_Npnl23bjoSNImRvajslIi7icrfvtnd0b9jMgT7VHlKOpRwYlYL61WKBP9Ojm3zt9ipgM-vLPeVLV4dEAkkQ9qVE-WevoLX8UIAXQ_NmfOp4UfC9RWBPaG1uICFdVlKEY0_L02RjbP11xATPoBK2275hqUlibGcseBqjUle66J5TcOpIm_XObV8wJUEwfXZ_kfhy2Alc3cRKfd44cJk-Nae38Kr86Bw3No5H9uuchqzNSNtHIySvWNsoLY4GyqQJp7Td-bScN7NRWrUv8k5t_ulyA4A", "payload": "" } 2024-11-23 04:48:48,935:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386373457 HTTP/1.1" 200 824 2024-11-23 04:48:48,937:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:48:49 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgTYcqHILu5_uF5O_-bgY713fQgEWrWkjjkUugYv7aNnFo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:12Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386373457/JJFsqQ", "status": "pending", "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386373457/CBmaOg", "status": "pending", "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386373457/d3Fmcw", "status": "pending", "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI" } ] } 2024-11-23 04:48:48,937:DEBUG:acme.client:Storing nonce: eYk8fkgTYcqHILu5_uF5O_-bgY713fQgEWrWkjjkUugYv7aNnFo 2024-11-23 04:48:48,940:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:48:48,941:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-11-23 04:48:48,942:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:48:48,942:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:48:48,943:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:48:48,944:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:48:48,944:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:48:48,944:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:48:48,945:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:48:48,986:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-11-23 04:48:48,986:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:48:48,987:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-11-23 04:48:48,995:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-11-23 04:48:48,997:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-11-23 04:48:48,997:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-11-23 04:48:48,997:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-23 04:48:48,998:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-11-23 04:48:49,000:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-23 04:48:49,064:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-23 04:48:49,243:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:48:49,244:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-23 04:48:49,245:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-23 04:48:49,251:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:56 UTC. 2024-11-23 04:48:49,251:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:48:49,252:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:48:49,258:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:48:49,258:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:48:49,258:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:48:49,263:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:48:49,264:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:48:49,266:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:48:49,707:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:48:49,707:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:48:50 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ByhVgRwcpDk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-23 04:48:49,708:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:48:56,450:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8789_key-certbot.pem 2024-11-23 04:49:02,965:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8787_csr-certbot.pem 2024-11-23 04:49:02,966:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:49:02,966:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:49:03,113:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:49:03,114:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:49:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTe1XML6mlqaUjc0UaOV6Qizvwt2iKYKOs-OazzG8t_AU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:49:03,114:DEBUG:acme.client:Storing nonce: zIaIDaiTe1XML6mlqaUjc0UaOV6Qizvwt2iKYKOs-OazzG8t_AU 2024-11-23 04:49:03,115:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:49:03,124:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRlMVhNTDZtbHFhVWpjMFVhT1Y2UWl6dnd0MmlLWUtPcy1PYXp6Rzh0X0FVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "daYOBqwtP_ucEtde3gmnngQWBSsYHQs9j8aAkO5nsICFEFapcGL5iUN7d8Bliqvx9vyKX5T0RcXY0ApXNZ2zXy5tD6mqnTL5AKZ4gfWOgbKX-kvApYtrs7Cmd1WZsJNRyP-L_oIxOFYKbTBWWrJKXz9EXNiKCFYtZeohLXEwS93SWL4f_JNnW2IF7j-f6bDaI6rc7I20uBp_sscW0IseDLTEnPrdfUq_zuJgb8EL1nO2b9KvGTNSou0oO-EQ1q2sjNMsmQw-_dDCin2LlmX0-DRP1p3ojSTS3wcwSHkAQYaZZ4Ll0PIu6WGPZ9eXESvcQqezVnQKXUSI5R0XNpsrlA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-23 04:49:03,303:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2024-11-23 04:49:03,304:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:49:03 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335553997 Replay-Nonce: gtp33icH0hj-KLwesMzDRLA7v0pr_yhnniHX1P4ORYIPJ9t0LB8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:24Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386447927" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335553997" } 2024-11-23 04:49:03,304:DEBUG:acme.client:Storing nonce: gtp33icH0hj-KLwesMzDRLA7v0pr_yhnniHX1P4ORYIPJ9t0LB8 2024-11-23 04:49:03,305:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:49:03,311:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386447927: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0gwaGotS0x3ZXNNekRSTEE3djBwcl95aG5uaUhYMVA0T1JZSVBKOXQwTEI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY0NDc5MjcifQ", "signature": "bMPCeOEFZkZ9zHqOZQn172p6Gq105tV4gXYxJOtkMj9B6j7eRyPw6ItYIJfnYgJJim4yR5z6vFqVeGuldY0ubZ_o1jxKnP4FoleovAyYrvxNUB9XWCNyLvjECse5pYjiAuHmrl8aXVF9S0N6BgF9t8C0If79bgg-iOaTri3hIn7eq1KVmtbr4iKuZNE0z9-3vTYRuLnYGsrw3a16Eexyg9gILdZy0ptxWFM1ZUk1pkHhPTjv_IB9mbTJuFzEPe2bb4gkYa09BLEU3y4B7_JcNa__bcwvQ7fGNF2fj4dLWZkOUOp-RfqFHAhNdtKrB75P8CRVDE89NYIu3RVks1XvHQ", "payload": "" } 2024-11-23 04:49:03,466:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386447927 HTTP/1.1" 200 829 2024-11-23 04:49:03,468:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:49:03 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTmgvH_lc7vVyuCG2DP6nKbOs_03-iIkix-ZGH38mrweo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:24Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386447927/lliEPw", "status": "pending", "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386447927/eNwFHQ", "status": "pending", "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386447927/PLs0Mg", "status": "pending", "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY" } ] } 2024-11-23 04:49:03,468:DEBUG:acme.client:Storing nonce: zIaIDaiTmgvH_lc7vVyuCG2DP6nKbOs_03-iIkix-ZGH38mrweo 2024-11-23 04:49:03,469:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:49:03,469:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-11-23 04:49:03,469:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:49:03,470:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:49:03,470:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:49:03,471:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:49:03,471:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:49:03,471:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:49:03,473:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:49:03,528:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-23 04:49:03,783:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:49:03,784:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-23 04:49:03,785:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-23 04:49:03,790:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:15 UTC. 2024-11-23 04:49:03,790:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:49:03,790:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:49:03,795:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:49:03,797:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:49:03,797:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:49:03,802:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:49:03,803:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:49:03,805:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:49:04,266:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:49:04,267:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:49:04 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "SrR5KZ6tb-k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-23 04:49:04,268:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:49:11,084:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8790_key-certbot.pem 2024-11-23 04:49:17,321:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8788_csr-certbot.pem 2024-11-23 04:49:17,321:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:49:17,322:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:49:17,476:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:49:17,476:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:49:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiT0zvRmdS6eM7CUrcQjPdXM9YHi9_NCIJHMV8NA6ILGDY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:49:17,477:DEBUG:acme.client:Storing nonce: zIaIDaiT0zvRmdS6eM7CUrcQjPdXM9YHi9_NCIJHMV8NA6ILGDY 2024-11-23 04:49:17,477:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:49:17,483:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVQwenZSbWRTNmVNN0NVcmNRalBkWE05WUhpOV9OQ0lKSE1WOE5BNklMR0RZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Co4sbQh2nlbma_Arv0SEr-mGD2yayWnnum4jImJLP0n7dPBPv4T3UNbr3ex-wVQvYHb_n25E4Gz2qJyNgsNmGjbhQCPkZeQPxhYUkIjDyqZmXj5Ks4CCHuFFZb0KNDswU_Qkc7rEpZlpIIGvFobidZKqsU62MQ8D4BpM35ZG1Z2HRWu9uPXEoeiCdTGlnsrofAdCMi2SPOMxffvcjv_JpjVdSug3d4nIbXSNXYDUvdsAdpvIgFQmB06Oy3MJs14oSZANYYhnW3F0i0VJJbsO_-fmFCmvDAxOBs_-_DgQ5NhLf7d6h-9Tg_-ROxsc3O7O_W9jtsH1ZIq9D_0b_suADQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-23 04:49:17,680:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2024-11-23 04:49:17,680:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:49:17 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335602617 Replay-Nonce: gtp33icHc3ZdqnSJYVZ3r_LM4NUEkP0IIZR0cx5xZKYQI-lKdXM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:37Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386519187" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335602617" } 2024-11-23 04:49:17,681:DEBUG:acme.client:Storing nonce: gtp33icHc3ZdqnSJYVZ3r_LM4NUEkP0IIZR0cx5xZKYQI-lKdXM 2024-11-23 04:49:17,681:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:49:17,687:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386519187: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0hjM1pkcW5TSllWWjNyX0xNNE5VRWtQMElJWlIwY3g1eFpLWVFJLWxLZFhNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY1MTkxODcifQ", "signature": "yPllEdZ6RvKZVXcSSbkuMRiLsxyjMveSC-aSw4uv_8plZmrKhBLlbxVtDndbdtb1KQxkPr22nyPSTpSJEbOZEPFjVB7uSuJWI0Jgy8AS_27eQNtfeN5Hzw6LqtS8FPH1VHO6HMkuNWCfkkPr2IfQ67woT-GEmzVfdAdg4HO8QneQsBtpf9xnZMVczaFiW09bzT3qCSvrCrfp-3C2BU2B0OXGEYtzXSruHSNckkhp5AiuIJnn3iN5ktGbCKENs1drAMj-QDKEjL10pTBJ6lcrbYSdC3ZfWVXe5lbHHqnvseZASJ491mI_DGHnrQa89CfF8om7xVYq_wHBV52yaMd7LA", "payload": "" } 2024-11-23 04:49:17,849:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386519187 HTTP/1.1" 200 828 2024-11-23 04:49:17,850:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:49:18 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gtp33icHtmwdifwyC6sLN67ONRBMRpqqIAMsdbsWiV7ALtkMSZs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:37Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386519187/XcgphA", "status": "pending", "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386519187/-jLYlg", "status": "pending", "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386519187/XHeZAA", "status": "pending", "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk" } ] } 2024-11-23 04:49:17,850:DEBUG:acme.client:Storing nonce: gtp33icHtmwdifwyC6sLN67ONRBMRpqqIAMsdbsWiV7ALtkMSZs 2024-11-23 04:49:17,850:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:49:17,851:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-11-23 04:49:17,852:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:49:17,852:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:49:17,853:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:49:17,853:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:49:17,854:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:49:17,854:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:49:17,856:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:49:17,900:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-23 04:49:18,071:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:49:18,073:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-11-23 04:49:18,074:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-11-23 04:49:18,078:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:32 UTC. 2024-11-23 04:49:18,078:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:49:18,079:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:49:18,084:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:49:18,085:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:49:18,085:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:49:18,090:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:49:18,091:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:49:18,093:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:49:18,546:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:49:18,548:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:49:18 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "wz6AlbzhH_k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-23 04:49:18,548:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:49:24,980:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8791_key-certbot.pem 2024-11-23 04:49:31,051:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8789_csr-certbot.pem 2024-11-23 04:49:31,052:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:49:31,052:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:49:31,210:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:49:31,210:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:49:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gtp33icH75rkGawzPrf49uGxnM4Gs8NX-6KQZ9e1XBBj64giSWI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:49:31,211:DEBUG:acme.client:Storing nonce: gtp33icH75rkGawzPrf49uGxnM4Gs8NX-6KQZ9e1XBBj64giSWI 2024-11-23 04:49:31,211:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:49:31,216:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0g3NXJrR2F3elByZjQ5dUd4bk00R3M4TlgtNktRWjllMVhCQmo2NGdpU1dJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sI08QxshrvMbDE96p0Ze8eyB-oVZcasJyjgcPrT8eSr0mDrWMeMdGUBRnofJRR2MGb8iAqObajJOxUSLtNbdPomlEnQly2OLmylyGwLopUxuy89iaxsiUiACipF2t4icDGRSBn7zyB83ojaaV3zjWZwvTw1yToXqMWIMW0RydW1IaVjF2A4ncDhq8bC262qSCdOVnkktHs5xigixNbf7_pw0yqJlF1MkrgEisOjjdN-dc-alCokFT5L-9WgewxmUJGrkqgg-En_jcWJr6kufFYWpF7b6jpersCF39ZSoqIVb3V3zG7_NVSLsWHj_z7W_Es1aPZUdbsIdhg3AgqolqQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-23 04:49:31,401:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2024-11-23 04:49:31,401:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:49:31 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335648247 Replay-Nonce: gtp33icHXhgd_86JxMsragFO-b71ub6TtOUypz6TXuE_yCpkpFk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:49Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386588377" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335648247" } 2024-11-23 04:49:31,402:DEBUG:acme.client:Storing nonce: gtp33icHXhgd_86JxMsragFO-b71ub6TtOUypz6TXuE_yCpkpFk 2024-11-23 04:49:31,402:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:49:31,408:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386588377: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0hYaGdkXzg2SnhNc3JhZ0ZPLWI3MXViNlR0T1V5cHo2VFh1RV95Q3BrcEZrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY1ODgzNzcifQ", "signature": "Q3n1vsSYjIt33j24OCXtX9UozX5kEW4IWag062xRvStNUjOygBKkNGSkgSkfZk-Q8MjSCYgpDRz67nGgOpvjnD0IbVDflTSEkpyRUg8zDBaADNvnA-f4ZW8oHeInoE8ydJwpGFOeXNEAdGxc8CS-01HPfa5nTlgGQSX19aECOKjehIJUgz5WfHRdA5qlSPU_R4cpGz2YnU2V9ThEH__1Wa6Q3vdv1SFX5BQzksSc7-pQ4rPjU-JDWtdypKVOov--WQ0_aia0poAenC77lfcGFtG7QgDm5nsnR6fDk_Bs_5tYZInDLRBBuBDYhqLov9YwABktbWCL4d8VvhSeMggnsA", "payload": "" } 2024-11-23 04:49:31,586:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386588377 HTTP/1.1" 200 827 2024-11-23 04:49:31,586:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:49:31 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiT6jkenqm78IZaHx-nWtsHWSF0ZQoQBq_8BZ3IpQfzXAY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:49Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386588377/hneKNA", "status": "pending", "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386588377/mNBDgA", "status": "pending", "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386588377/67ZXmA", "status": "pending", "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ" } ] } 2024-11-23 04:49:31,587:DEBUG:acme.client:Storing nonce: zIaIDaiT6jkenqm78IZaHx-nWtsHWSF0ZQoQBq_8BZ3IpQfzXAY 2024-11-23 04:49:31,587:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:49:31,588:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-11-23 04:49:31,588:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:49:31,589:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:49:31,590:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:49:31,590:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:49:31,590:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:49:31,591:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:49:31,592:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:49:31,642:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-23 04:49:31,851:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:49:31,852:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-11-23 04:49:31,853:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-11-23 04:49:31,858:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:52 UTC. 2024-11-23 04:49:31,858:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:49:31,858:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:49:31,864:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:49:31,864:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:49:31,864:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:49:31,869:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:49:31,869:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:49:31,872:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:49:32,312:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:49:32,313:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:49:32 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4QJiRuuHqk4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-23 04:49:32,313:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:49:39,502:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8792_key-certbot.pem 2024-11-23 04:49:46,750:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8790_csr-certbot.pem 2024-11-23 04:49:46,751:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:49:46,751:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:49:46,898:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:49:46,899:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:49:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTqyL_TgREGlyR17iWC3SlJ3ZONau_eaTyoMrXBlpiA2w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:49:46,899:DEBUG:acme.client:Storing nonce: zIaIDaiTqyL_TgREGlyR17iWC3SlJ3ZONau_eaTyoMrXBlpiA2w 2024-11-23 04:49:46,899:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:49:46,905:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRxeUxfVGdSRUdseVIxN2lXQzNTbEozWk9OYXVfZWFUeW9NclhCbHBpQTJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wa7k2c_UVb3ACWhtilJgnJYZvWrJOLZSNOhy5D5nZSS6NQgR3OTkX4ekGtAXtswtAoKo_9c7BLO2-pGBAXKzrpF4OoxpQ_X6Fy6ZDdXX4HqDF7B9nKUQ5fnW4Cr699Y5dXCW3OcncU9wjmndpj0etOHc0LZAOpkLrooGxvfBrYwdBWRDsvVlKDHLetWkCp_WAKjxqjfRZ2OiDFlpgmr0bV84LdIA5UiZ9jcDhdIdIHdk3ktkFg-2F6NU2VG6dyzsoAydyBquK45Vx9vgSk7srYBZmYSCDsh5L5bzWyeHhXE-gY56jMtvrIk0JrJywqjhglS8c-I_2-JDNK4BbbOExg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-23 04:49:47,097:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-23 04:49:47,097:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:49:47 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335696957 Replay-Nonce: zIaIDaiTKJCvI7IFeHpecOMvo479W2gQbuD1oYrsdFEuMy2eXZQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:33:02Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386660297" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335696957" } 2024-11-23 04:49:47,098:DEBUG:acme.client:Storing nonce: zIaIDaiTKJCvI7IFeHpecOMvo479W2gQbuD1oYrsdFEuMy2eXZQ 2024-11-23 04:49:47,098:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:49:47,104:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386660297: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRLSkN2STdJRmVIcGVjT012bzQ3OVcyZ1FidUQxb1lyc2RGRXVNeTJlWFpRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY2NjAyOTcifQ", "signature": "ND3EDr4_KKrY3WRHSuEJmN69YIPUqqa2bGMgd0LLhcSLWZVZ2aUXAWlDNU1CSt1cSLw8IgUmhxlbmyh5pNFlr6Xj-deh2NmJbvDSqV2nZZmzmWLMBkcYsFIOMmHhiwc9PTGoDBlJ4ED9NSCwP2DY2dEqpEXb47ZFS2G2oVCxqJRiX1fo_YivRVtCHnZVwQMK1I_AxonR4G0xxckTkc8K4xe1WeO70Y3_Vku-eJQujRg5RCLZWGjdTb9Itt5ZeFjGon53O7WIPcVfyE-P007cHjIE9KUfpLck8UjLW8K1WH54aEQqez8wcTeaaPK0Ooxzgx1aI4-Ci-HuOmAfkkEkmg", "payload": "" } 2024-11-23 04:49:47,258:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386660297 HTTP/1.1" 200 823 2024-11-23 04:49:47,258:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:49:47 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTWXpiCad4Yn4aDcxt5WU7j3uf2EqpFHOBEFDXCmezHGA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:33:02Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386660297/9adDwA", "status": "pending", "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386660297/hz_bKw", "status": "pending", "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386660297/Jd3mYQ", "status": "pending", "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM" } ] } 2024-11-23 04:49:47,259:DEBUG:acme.client:Storing nonce: zIaIDaiTWXpiCad4Yn4aDcxt5WU7j3uf2EqpFHOBEFDXCmezHGA 2024-11-23 04:49:47,259:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:49:47,259:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-11-23 04:49:47,260:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:49:47,260:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:49:47,261:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:49:47,261:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:49:47,261:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:49:47,261:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:49:47,262:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:49:47,317:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-23 04:49:47,518:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:49:47,520:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-23 04:49:47,521:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-23 04:49:47,525:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:10 UTC. 2024-11-23 04:49:47,525:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:49:47,525:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:49:47,531:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:49:47,531:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:49:47,532:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:49:47,538:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:49:47,539:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:49:47,541:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:49:48,024:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:49:48,025:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:49:48 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Aa3xhW8g4ik": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-23 04:49:48,025:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:49:54,487:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8793_key-certbot.pem 2024-11-23 04:50:00,826:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8791_csr-certbot.pem 2024-11-23 04:50:00,827:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:50:00,827:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:50:00,990:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:50:00,990:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:50:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgT_MTU2cLi3y2NQGrlCpDjruu5yRFW-Ht8yoZOV_VnvUw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:50:00,990:DEBUG:acme.client:Storing nonce: eYk8fkgT_MTU2cLi3y2NQGrlCpDjruu5yRFW-Ht8yoZOV_VnvUw 2024-11-23 04:50:00,990:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:50:00,999:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RfTVRVMmNMaTN5Mk5RR3JsQ3BEanJ1dTV5UkZXLUh0OHlvWk9WX1ZudlV3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jpiPRHznG0jIiDw7vrK2UOfU3Yy_kc82lRxIq2NgdlopQDUOm2ZWoZRqkYPhSRcdDStqVeDFuHmE-5ippQNKymQrvLVZq1tXx1fW92Y8A--L0_ryvtdCzVMnFBVA1K-wq2LBp3TEN5XLHNjl9O99nvuxlDe9WYFAZQiis6kn1_pkRRWh9AkrjByHkdDIKWhYLphE52Jhxz5SawA46Sc6UMBUFuQzgKYdpTaU8hWdHxcUnlReQXnFeCzZb9cWN0ndcJy96wZ-i43ZmNTN6bGUgwMklUyavJXRscCSgXxYncmF-U_gON8DUmcrx5gQroEEUGSjv0rHhLljZAUuNwFVew", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-23 04:50:01,193:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-23 04:50:01,194:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:50:01 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335757157 Replay-Nonce: eYk8fkgT4H-iI-NUL6qUgGwPZIlX8EKzLBTcEZ7o-R8LPaTwQRw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:33:15Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386749437" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335757157" } 2024-11-23 04:50:01,194:DEBUG:acme.client:Storing nonce: eYk8fkgT4H-iI-NUL6qUgGwPZIlX8EKzLBTcEZ7o-R8LPaTwQRw 2024-11-23 04:50:01,194:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:50:01,201:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386749437: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1Q0SC1pSS1OVUw2cVVnR3dQWklsWDhFS3pMQlRjRVo3by1SOExQYVR3UVJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY3NDk0MzcifQ", "signature": "Wk5x24Ihm1-uEeeLHARNIlKWJCbXCviYyRWF7RxNZaVrSWuBD9yjtuUrMiu8QtgNz9Iok6bihUnmdb_VULRhbWsynrjJOGbl91FGVO5B-zjX5ZfVOOb9IxEflD11ADj_k164l_Zh8s4gZOv66uXcRBgatEk0H0mz33642KCMAIVnu30KAr6Nva4dFXescKH-UxMUgltiZDqryx98cwGmFa7Dr8yfwYbK1P40mFryfYHRW9cbt-xwIt7Ik7O2mP0rjF9zZH6nR-pZ5fRmlFCGL-nSzPs3GymDcgBATQgKU2ivNUauhhpSl9fbzFYsYwc4E4tCc-B1DDbr5-bIpemGtg", "payload": "" } 2024-11-23 04:50:01,368:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386749437 HTTP/1.1" 200 823 2024-11-23 04:50:01,369:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:50:01 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgTjUcbwJ4KGyGiGrg54em2sd80qF5TesVTUQACn0kEnBk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:33:15Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386749437/hizs-Q", "status": "pending", "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386749437/RcBV3Q", "status": "pending", "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386749437/ODSfIw", "status": "pending", "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0" } ] } 2024-11-23 04:50:01,369:DEBUG:acme.client:Storing nonce: eYk8fkgTjUcbwJ4KGyGiGrg54em2sd80qF5TesVTUQACn0kEnBk 2024-11-23 04:50:01,370:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:50:01,370:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-11-23 04:50:01,371:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:50:01,371:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:50:01,372:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:50:01,372:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:50:01,372:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:50:01,373:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:50:01,374:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:50:01,416:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-23 04:50:01,606:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-23 04:50:01,607:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-23 04:50:01,608:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-23 04:50:01,613:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:32 UTC. 2024-11-23 04:50:01,614:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-23 04:50:01,614:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-23 04:50:01,619:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-23 04:50:01,619:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-23 04:50:01,620:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-23 04:50:01,624:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-23 04:50:01,625:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-23 04:50:01,627:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-23 04:50:02,113:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-23 04:50:02,113:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:50:02 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LayfwhpXEjw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-23 04:50:02,114:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-23 04:50:08,426:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8794_key-certbot.pem 2024-11-23 04:50:14,671:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8792_csr-certbot.pem 2024-11-23 04:50:14,672:DEBUG:acme.client:Requesting fresh nonce 2024-11-23 04:50:14,672:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-23 04:50:14,834:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-23 04:50:14,835:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:50:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FVNV6H0McGi43gJKUKNETdHrgt9lKmEzd5V_4I2muGQ83XvT5kg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-23 04:50:14,835:DEBUG:acme.client:Storing nonce: FVNV6H0McGi43gJKUKNETdHrgt9lKmEzd5V_4I2muGQ83XvT5kg 2024-11-23 04:50:14,836:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-11-23 04:50:14,843:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1jR2k0M2dKS1VLTkVUZEhyZ3Q5bEttRXpkNVZfNEkybXVHUTgzWHZUNWtnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PP67LGEMxwq9O6u2Us8BM5FbbVpzsQQtdtKhUksEsDtNtuluk1F7ZL31BZCAXTXXIwD67tTqIxffVRS1BrL6cfkgvhug2VgAhr3DOtyVFgl9XUo-tzA7xfFwqkT8v_cUrQPsKaC3H0UONeKyHRehY4_1gHF4VaUotHXmYOJZoUnp77v5OhjTs1FOwr1y_bGJ28IJ1tB0lExEDR1Kf9RuZwfHPMAVzLU2ezVAav1RCUTWquIimPUqQOsnAe0zrfzgzwtecV8iwdEmyjs-wAtumhtQiCLoPjcu5Rzo4W_rE7uCqAACTDX6gr0SAEvWHX2a7G2fZiLfKbfCxLkkp26A_w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-23 04:50:15,041:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-23 04:50:15,042:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 23 Nov 2024 03:50:15 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335805657 Replay-Nonce: eYk8fkgTo1_IatWIA5HxnjHy5eGNf8i-UrJSg5erluvzoYrJhPA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:33:28Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386819677" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335805657" } 2024-11-23 04:50:15,043:DEBUG:acme.client:Storing nonce: eYk8fkgTo1_IatWIA5HxnjHy5eGNf8i-UrJSg5erluvzoYrJhPA 2024-11-23 04:50:15,043:DEBUG:acme.client:JWS payload: b'' 2024-11-23 04:50:15,052:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386819677: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RvMV9JYXRXSUE1SHhuakh5NWVHTmY4aS1VckpTZzVlcmx1dnpvWXJKaFBBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY4MTk2NzcifQ", "signature": "hVSMUdbyJlGYSNkcw0uNiHOFIBDOUqD86nIkj7UCd3J4fosGWqUMvzXb-n7s9-QGtRMGmm4WUc1lmpi8AZkG0qW5utQ_TArTbXp3Q9AG82ip3m76DZuANnX4_2r8Mbh2SgOsO3E6GAHxwmBrIFAl9M79a0C0KicwSH1mIHUKfyz6q0_H5N9NaHklnJOlXC1LiMY_6w9DLio88WdhIMaVkYjcYDFb7rbL_bhH9HbcGCjmtf62H-1mjpUip-utlzpQoTgiXGux2_iOm0A-9qQHx7U7Uil8ZRwNDa3Aeim4rFOid5F-i_LdeK28CqaYlFml7pckEeaYoYcXhFhMKJAAEw", "payload": "" } 2024-11-23 04:50:15,220:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386819677 HTTP/1.1" 200 823 2024-11-23 04:50:15,221:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 23 Nov 2024 03:50:15 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FVNV6H0MioJy24FZvhoztHCLoeRG41eOB7NnEaBYX064bUL4jRA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:33:28Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386819677/-esrVQ", "status": "pending", "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386819677/-G9CyQ", "status": "pending", "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386819677/7gZi0Q", "status": "pending", "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU" } ] } 2024-11-23 04:50:15,221:DEBUG:acme.client:Storing nonce: FVNV6H0MioJy24FZvhoztHCLoeRG41eOB7NnEaBYX064bUL4jRA 2024-11-23 04:50:15,222:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-23 04:50:15,222:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-11-23 04:50:15,223:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-23 04:50:15,223:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-23 04:50:15,224:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:50:15,224:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-23 04:50:15,224:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-23 04:50:15,224:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-23 04:50:15,226:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-23 04:50:15,226:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-11-23 04:50:15,227:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-11-23 04:50:15,239:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-11-23 04:50:15,241:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)