2024-11-22 13:30:47,882:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-11-22 13:30:47,882:DEBUG:certbot._internal.main:Arguments: [] 2024-11-22 13:30:47,882:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-22 13:30:48,553:DEBUG:certbot._internal.log:Root logging level set at 20 2024-11-22 13:30:48,553:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-11-22 13:30:48,591:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04D26ED0> and installer <certbot._internal.cli.cli_utils._Default object at 0x04D26ED0> 2024-11-22 13:30:48,635:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 13:30:48,834:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:30:48,835:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-11-22 13:30:48,840:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-11-22 13:30:48,848:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:06 UTC. 2024-11-22 13:30:48,849:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:30:48,849:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:30:48,854:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04784990> Prep: True 2024-11-22 13:30:48,855:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04784990> and installer None 2024-11-22 13:30:48,855:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:30:48,898:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:30:48,899:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:30:48,902:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:30:49,370:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:30:49,371:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:30:49 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "JFDfHUaSi6g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:30:49,372:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:30:55,277:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8767_key-certbot.pem 2024-11-22 13:31:01,145:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8765_csr-certbot.pem 2024-11-22 13:31:01,146:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:31:01,146:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:31:01,295:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:31:01,296:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: zIaIDaiTCV2yXLh1ytC0RwylC_RTtOTCyBUqLhJhAG2LgR_ViHQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:31:01,296:DEBUG:acme.client:Storing nonce: zIaIDaiTCV2yXLh1ytC0RwylC_RTtOTCyBUqLhJhAG2LgR_ViHQ 2024-11-22 13:31:01,296:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:31:01,303:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRDVjJ5WExoMXl0QzBSd3lsQ19SVHRPVEN5QlVxTGhKaEFHMkxnUl9WaUhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cVLGKwLcysluOF6648itYKUw0mNL59fc3j6NxqaagTbzCFU2cWNnoQvSJzexhODyCgiNr_8Jqe8Sdq1QMVNAEENcSW8tJDe2FQTYZ9_rR51khinJZudWXpTfh47DJPhTqGkXL-vNlCAWNnbrBlBPxt65xLEc7LxQXjte6LVQONpfwmy2sVUAa8baFmx1Zsmt0yRS89PhE7xuY3UtanjBqSeX6iZD2aIUW8q8_RyBr_Fla4gdyU9xcWQo3kInP0drS7X_MOdiNIHMtTBZCbgre4nJwdMyYxRGkofdpDRvbQK3_ZqVFUenBBf1p8baW7aOSo1V6fsrGpcZ11d06X4uQQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-22 13:31:01,467:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2024-11-22 13:31:01,467:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:31:01 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335168147 Replay-Nonce: zIaIDaiTvMfwLqLmCa_-l-pzGrDbMnaZFyAiNPrDmWB8i46UhVM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:30:42Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385871837" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335168147" } 2024-11-22 13:31:01,468:DEBUG:acme.client:Storing nonce: zIaIDaiTvMfwLqLmCa_-l-pzGrDbMnaZFyAiNPrDmWB8i46UhVM 2024-11-22 13:31:01,468:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:31:01,474:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385871837: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVR2TWZ3THFMbUNhXy1sLXB6R3JEYk1uYVpGeUFpTlByRG1XQjhpNDZVaFZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODU4NzE4MzcifQ", "signature": "mILJvCBEi5WolwOntzaKq0lbpI1HFnJ0r3ZEo27gQyeuX0g1HoDmMfxK9UANw9xPnNvRSU2w6bpANvRtb_z7rQnfL2NBs_z7bkfUF6BFG-TAQ8ID_LbfS-Jj2N6PRmq4HH-cSeF5CpXJTe7v8CcfLGP0usnLuAdLLTtozIAQopLeTkoosMJjmB0ZG5x7PBq8ZW7rzB72EMMr1e82TE10WL3J2OOdyTIdhuyBAoqlSA1GsWV9P3yahAyahHOhkV71OkJb5YQG7l-1LfA_qHz2geRxcyhrl16C9-mXTwj-bTK4O0skT8U6dTcrjm3v7uwF9_SHcfF9fMiT5s-WEAxcJw", "payload": "" } 2024-11-22 13:31:01,631:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433385871837 HTTP/1.1" 200 828 2024-11-22 13:31:01,632:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:01 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: gtp33icHlvCUk6hyGgFmGb2XJqf9k7xe_eqN_w-8SO_IxbQB0-I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:30:42Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385871837/UndPAg", "status": "pending", "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385871837/lzGNtw", "status": "pending", "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385871837/08KxfQ", "status": "pending", "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg" } ] } 2024-11-22 13:31:01,632:DEBUG:acme.client:Storing nonce: gtp33icHlvCUk6hyGgFmGb2XJqf9k7xe_eqN_w-8SO_IxbQB0-I 2024-11-22 13:31:01,632:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:31:01,632:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-11-22 13:31:01,640:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:31:01,640:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:31:01,643:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:31:01,643:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:31:01,643:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:31:01,644:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:31:01,648:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:31:01,687:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 13:31:01,927:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:31:01,928:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 13:31:01,929:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 13:31:01,935:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:27 UTC. 2024-11-22 13:31:01,935:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:31:01,935:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:31:01,940:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D2BE30> Prep: True 2024-11-22 13:31:01,940:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D2BE30> and installer None 2024-11-22 13:31:01,940:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:31:01,945:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:31:01,946:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:31:01,948:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:31:02,415:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:31:02,415:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:02 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "bmLW8Q1p9SI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:31:02,416:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:31:08,378:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8768_key-certbot.pem 2024-11-22 13:31:13,971:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8766_csr-certbot.pem 2024-11-22 13:31:13,972:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:31:13,972:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:31:14,128:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:31:14,128:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: FVNV6H0MFwg5tAt4dpUFftCakmOydxrMqZyKW-_FinjRMozN_1k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:31:14,128:DEBUG:acme.client:Storing nonce: FVNV6H0MFwg5tAt4dpUFftCakmOydxrMqZyKW-_FinjRMozN_1k 2024-11-22 13:31:14,129:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:31:14,135:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1Gd2c1dEF0NGRwVUZmdENha21PeWR4ck1xWnlLVy1fRmlualJNb3pOXzFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qYKHkKbPyUiBkmgri_YPTrYwJmMTpkniRMSCf3GhgQgjz28zpcNS9-OUNXzaD3KbajO7LAA55ihGsf6IIUDTzGerkBghxlZOGX6oBn3Wdh-M8Fy12nMAeWk-XgDmv76v79vNPmuAGMKwjVDyArqQb2TxAbv9W1pHUB8ophszGwEYm5NQiPrJN9TDOYeEyPss1afLNwaW5_khEWt3nkwjySBXD92_Fv3-G3bfis5Da_WpLKuvaeY4mNxyOIQ6BO5ZUqs9R6KmeIeRZg6pxDz9PO6jk9McTs7wSuWSN_UZh6thw5-jsa9p3BAMJZWKJUEZdqdFaHOshtti48KgFn7q7g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-22 13:31:14,320:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-22 13:31:14,321:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:31:14 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335212297 Replay-Nonce: FVNV6H0MXAxhW_G7BI5_UQYijf3k00IjFXKQXnl-jriCwmiT9rc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:30:55Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385936637" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335212297" } 2024-11-22 13:31:14,321:DEBUG:acme.client:Storing nonce: FVNV6H0MXAxhW_G7BI5_UQYijf3k00IjFXKQXnl-jriCwmiT9rc 2024-11-22 13:31:14,321:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:31:14,327:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385936637: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1YQXhoV19HN0JJNV9VUVlpamYzazAwSWpGWEtRWG5sLWpyaUN3bWlUOXJjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODU5MzY2MzcifQ", "signature": "LJ-M8r6V_SzBlUg0JQK2Pe28JR52KPoy3BYd-srN-FsXiOv7_MEh97AhiCX8Woozg3OZknmsuriTUZH9k2hEFIxiMgyyZxkuSRTazN6ODdnxxfMK0guWPTCR4oypBPFaT_XfPDqIop8OVbWc3iIpk66JpWqrCZ1WK-rhm79kka9IBh8cKsP_HVldxnqFirbBG1kT7WIaVI_lPPK_-5_G24_THCEMaqaLOcUn7VFDl1ouGIjzR3fuHPH7R-4pVzLakqKn0FGfzmqj-k9k03EzUSQf0957uwf95lcR50Ngd1Ler4xjSdMFNMi0oVSeMlqK3PtH3GZ1Zg8YOXWDQQfVzw", "payload": "" } 2024-11-22 13:31:14,488:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433385936637 HTTP/1.1" 200 822 2024-11-22 13:31:14,489:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:14 GMT Content-Type: application/json Content-Length: 822 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: FVNV6H0M7QH2PXl3Fp7CAH75AeSwXytheZqQ9913PZCmZQuc8xo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:30:55Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385936637/Q-td3A", "status": "pending", "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385936637/bnCyvA", "status": "pending", "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385936637/UMKluQ", "status": "pending", "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I" } ] } 2024-11-22 13:31:14,489:DEBUG:acme.client:Storing nonce: FVNV6H0M7QH2PXl3Fp7CAH75AeSwXytheZqQ9913PZCmZQuc8xo 2024-11-22 13:31:14,490:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:31:14,490:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-11-22 13:31:14,490:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:31:14,490:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:31:14,491:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:31:14,491:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:31:14,491:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:31:14,493:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:31:14,494:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:31:14,543:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 13:31:14,812:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:31:14,813:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-22 13:31:14,814:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-22 13:31:14,819:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:47 UTC. 2024-11-22 13:31:14,819:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:31:14,819:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:31:14,824:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04799270> Prep: True 2024-11-22 13:31:14,825:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04799270> and installer None 2024-11-22 13:31:14,825:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:31:14,829:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:31:14,829:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:31:14,832:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:31:15,312:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:31:15,313:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:15 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3mIefRasXCA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:31:15,313:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:31:21,431:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8769_key-certbot.pem 2024-11-22 13:31:27,045:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8767_csr-certbot.pem 2024-11-22 13:31:27,046:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:31:27,046:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:31:27,206:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:31:27,207:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eYk8fkgT6WiPrz-jjCCu1ufMlPJ5Epp80QjnUvVh958oGvT7P34 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:31:27,207:DEBUG:acme.client:Storing nonce: eYk8fkgT6WiPrz-jjCCu1ufMlPJ5Epp80QjnUvVh958oGvT7P34 2024-11-22 13:31:27,207:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:31:27,213:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1Q2V2lQcnotampDQ3UxdWZNbFBKNUVwcDgwUWpuVXZWaDk1OG9HdlQ3UDM0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mHpem8lOU4IZP4t3axu1I5ucU6J43VqLVc19zTDQJeZ0LkWsulQyb1i1Y4hZi43N2pVdvdDE_CP8zS6r-pNWUOtoS_AzYgaH74rm__8D_H18bfdrudSu13FgCcIkb1jtRUvK12G1_SkV0zdY5sCDSDdokYYGrpDiSptX_ujkctuREEr_7UtV2BTpAMKYGEcnKqOk3wXWXsb0EgHYf8eQIbsM_Lx21WfpL5oa1P3iu-0g74pW2zk_zeNoGqcB1q664xwqZoxeaJYtLEipOW8Cc3WbX43UlFPEQrH2DYESxvvE0F9_ZNXrMVh1NpX_hE4sMaiL4E-z_MA-VrLbeVAAUg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-22 13:31:27,403:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2024-11-22 13:31:27,404:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:31:27 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335268447 Replay-Nonce: eYk8fkgTAt5G6m-9Ef3tssQ_U50wjetEXP1xUD-ydDymnuJsTOo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:08Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386017137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335268447" } 2024-11-22 13:31:27,404:DEBUG:acme.client:Storing nonce: eYk8fkgTAt5G6m-9Ef3tssQ_U50wjetEXP1xUD-ydDymnuJsTOo 2024-11-22 13:31:27,404:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:31:27,409:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386017137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RBdDVHNm0tOUVmM3Rzc1FfVTUwd2pldEVYUDF4VUQteWREeW1udUpzVE9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYwMTcxMzcifQ", "signature": "rq4jFFcBJDPmET0ua3Kt1_5K8MwKQOUGAFy-10b_o2M7Bub61PyuqXmRiDsDowdNhWjNAOGC1Rd8JhgI5Tseqhx24FRrwbnI_r1wNVcnm5SyDMfXfyZ4lN_3av-RcTt5sDapw3eO6GPDRllONA-jgcmNc-q5mPLKh8YjVEV31_d9J7JHDWvF8PD2vsVnSry_9Bq9Wt393-MQuX4141F-9HPzqTOoHEY9csJQc9Jg4vP_HFyMkZRi4VWfNq0sR20YOxcCJJt3ZuKZOEy6YDyKVQk1VK3MCdjmCYCF-rxdv0M4Gp3mv06iNkqar5RxXGcwXkwNAX44FhZiuZxvBbV3xQ", "payload": "" } 2024-11-22 13:31:27,575:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386017137 HTTP/1.1" 200 825 2024-11-22 13:31:27,575:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:27 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eYk8fkgTl5duAcbhAFsqBqPj21lqvXSfxl2ncQnX2b1R5E4k8PE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:08Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386017137/Q2i4ow", "status": "pending", "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386017137/4FswZw", "status": "pending", "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386017137/5ns8sQ", "status": "pending", "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY" } ] } 2024-11-22 13:31:27,576:DEBUG:acme.client:Storing nonce: eYk8fkgTl5duAcbhAFsqBqPj21lqvXSfxl2ncQnX2b1R5E4k8PE 2024-11-22 13:31:27,576:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:31:27,576:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-11-22 13:31:27,577:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:31:27,577:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:31:27,578:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:31:27,578:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:31:27,578:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:31:27,579:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:31:27,579:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:31:27,628:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 13:31:27,821:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:31:27,823:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-11-22 13:31:27,823:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-11-22 13:31:27,827:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-11-22 13:31:27,831:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:31:27,881:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 13:31:28,040:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:31:28,041:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 13:31:28,042:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 13:31:28,047:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:08 UTC. 2024-11-22 13:31:28,047:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:31:28,047:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:31:28,053:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0478BDD0> Prep: True 2024-11-22 13:31:28,053:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0478BDD0> and installer None 2024-11-22 13:31:28,053:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:31:28,058:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:31:28,059:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:31:28,061:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:31:28,546:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:31:28,546:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:28 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "rYXuYOTKW28": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:31:28,547:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:31:34,592:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8770_key-certbot.pem 2024-11-22 13:31:40,228:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8768_csr-certbot.pem 2024-11-22 13:31:40,228:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:31:40,229:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:31:40,389:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:31:40,390:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: FVNV6H0M6j0eUQynnso-jPEP3ksnL9fG0AbU-b7KUmtFt5_Qo6U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:31:40,390:DEBUG:acme.client:Storing nonce: FVNV6H0M6j0eUQynnso-jPEP3ksnL9fG0AbU-b7KUmtFt5_Qo6U 2024-11-22 13:31:40,390:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:31:40,396:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME02ajBlVVF5bm5zby1qUEVQM2tzbkw5ZkcwQWJVLWI3S1VtdEZ0NV9RbzZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dUFpkqK97_i6vqIl5ZAIx4D0IiwfAO5eVD22QNlMergy4AgK1bQOy6VsKpVlIGTmU3bS9p3zW4ifUCPHMoMbBgb9dd-KoUL3HGL3rdzJdP1Zh9vQw5MPwmAxpZnlFxZILowk4oTCDTxwUYBxqzYvMTCpev9k8Dai5jU0pvcl8Tg8lFrxr7Vtw9xV5nhnOr7mpJx-t-luugzqI_G0dTKstDyGN-ATS9Hm97XfS0qt5a_iyukd-ipBHx2I_zvbB2ePW8R--y-dv-dti2N0bSbpFIwU2EYoQr60cXJiBAQ23tj-LlwikSx7B1kO9BxmKC4PyGy9uAXW7ytVg465V0Tj6w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-22 13:31:40,585:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-22 13:31:40,585:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:31:40 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335319597 Replay-Nonce: FVNV6H0MsRxqdfQqx9-dy9qxjAL02Xai7S-EmfSEcIoRN5Ap2Y8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:21Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386094387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335319597" } 2024-11-22 13:31:40,586:DEBUG:acme.client:Storing nonce: FVNV6H0MsRxqdfQqx9-dy9qxjAL02Xai7S-EmfSEcIoRN5Ap2Y8 2024-11-22 13:31:40,586:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:31:40,592:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386094387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1zUnhxZGZRcXg5LWR5OXF4akFMMDJYYWk3Uy1FbWZTRWNJb1JONUFwMlk4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYwOTQzODcifQ", "signature": "UNldOt5iScnAhnMTjkxFaTFAFB_GRzI4Bln2nPVbqjdlO_fKBSkWKfmz7RgcJcMfZvFiiTxWU_J94hupJsV1G4alyaAb7PNTywAZxNlxsk8oCF094jp4wjmlHi9IFkgy__XkJp1Oph4a7qnfDw6Rr6C3vq-HmJo1DNMnO4416Q9mzCHzDt3S3HaM2u07RjSr78iD_xV7Z7uSaRHrMhcSqSad7sHso_ndBe0xpSYkC2wDzp8297qtja28xwm_pGwTgOZQSGIkZFPLx7hb9YnXA0FqTS271b3UmLICtZBOptua-Ouw31QhEam6VD5Bnavj8kpM8vLf3gZ1eHDp4HxvZw", "payload": "" } 2024-11-22 13:31:40,757:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386094387 HTTP/1.1" 200 819 2024-11-22 13:31:40,757:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:40 GMT Content-Type: application/json Content-Length: 819 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eYk8fkgTTqwvTyuP6KEdDH39cM7qISCezTRAVLAjm9FrmjZn_Q8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/C_-m4Q", "status": "pending", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/GfKRvQ", "status": "pending", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/-o13Yw", "status": "pending", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE" } ] } 2024-11-22 13:31:40,758:DEBUG:acme.client:Storing nonce: eYk8fkgTTqwvTyuP6KEdDH39cM7qISCezTRAVLAjm9FrmjZn_Q8 2024-11-22 13:31:40,758:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:31:40,759:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-11-22 13:31:40,759:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:31:40,759:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:31:40,760:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:31:40,760:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:31:40,761:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:31:40,761:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:31:40,762:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:31:40,801:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 13:31:40,999:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:31:41,001:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 13:31:41,001:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 13:31:41,007:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:27 UTC. 2024-11-22 13:31:41,007:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:31:41,007:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:31:41,011:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0501D9D0> Prep: True 2024-11-22 13:31:41,012:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0501D9D0> and installer None 2024-11-22 13:31:41,012:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:31:41,016:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:31:41,017:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:31:41,019:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:31:41,499:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:31:41,499:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ApTL2Zwwrv8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:31:41,500:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:31:47,571:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8771_key-certbot.pem 2024-11-22 13:31:53,197:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8769_csr-certbot.pem 2024-11-22 13:31:53,197:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:31:53,198:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:31:53,357:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:31:53,358:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eYk8fkgTXSa0iQUXSts6A1VGleZWIp-gAOuqNDjmD7jfBmN_OM0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:31:53,358:DEBUG:acme.client:Storing nonce: eYk8fkgTXSa0iQUXSts6A1VGleZWIp-gAOuqNDjmD7jfBmN_OM0 2024-11-22 13:31:53,359:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:31:53,365:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RYU2EwaVFVWFN0czZBMVZHbGVaV0lwLWdBT3VxTkRqbUQ3amZCbU5fT00wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "euUmx1q2k0mwi5fzhH9qFjL1hW3r7gavL5ekys4jYaCZfUGuFJTbp5zmndunNQjyi2XHxJc5gOsCVXIzTWNMmBaxYnEd7htmojzT3hk6XzhgTiSLwGq71_7DbTd45WCkpiVTLd0Jkh_nKVbbANHQyBoyuhglEtC-jIHZkX2Yx6YayLpoArlmyz8CPdiuc3TPpab-gxFSXWBZWeVIuILai2vT1CUT9DM5RZcv9gWBDEecOdp1R7EciCOiXdYpDs228Kaz2Advc2-CHgaJWaPtgmAZqg1rDyu29WkjGzvKllm4Oo0ORWNf-w4RykaswJLkBNdJxCyApEb8K5ci55kChA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-22 13:31:53,565:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-22 13:31:53,566:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:31:53 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335362247 Replay-Nonce: eYk8fkgT9AeDVllbDGe0tqYNdnU5YbloJpYTPaKD4M0WBvlVEAI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:34Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386161497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335362247" } 2024-11-22 13:31:53,566:DEBUG:acme.client:Storing nonce: eYk8fkgT9AeDVllbDGe0tqYNdnU5YbloJpYTPaKD4M0WBvlVEAI 2024-11-22 13:31:53,566:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:31:53,572:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386161497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1Q5QWVEVmxsYkRHZTB0cVlOZG5VNVlibG9KcFlUUGFLRDRNMFdCdmxWRUFJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYxNjE0OTcifQ", "signature": "S-qnECzMAKflYf-C-m1yJlReGLN00XPr4mXGHPmhntevJlgbmp1ZlW24SnYfm2eHEXYVmIFUgap4tlGfy2sevn77cTJWg_wgUVns0rJuOO1k_EyiXK3qGpx_4WDq356G-h8wRCgb-NlCf7vSYOvaW4cUTogXoqjLNE4ywmZL939tFVHxTgon4UdpciYRu-EGoK5YgDJ7toCZe3BvLUuaEkTks5miKZrL0PUVAM2jfR_M7yHGqupEOfq-c3N-8gcSAq9-KAmCP4tqJzJCKTlKYlGR8XVxS3i3Eq_c6tcLCQOR9zEAF8sHdh41SoOkRmbr3Y8WHZsCSz2MR8whYxDBZg", "payload": "" } 2024-11-22 13:31:53,742:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386161497 HTTP/1.1" 200 823 2024-11-22 13:31:53,743:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:53 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: FVNV6H0MKV0LdTsejR6q27fxusNFHsI6jUJZU-ZcpLMf5JGGsxk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:34Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386161497/G65eQA", "status": "pending", "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386161497/SgjmHQ", "status": "pending", "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386161497/DvhIEA", "status": "pending", "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI" } ] } 2024-11-22 13:31:53,743:DEBUG:acme.client:Storing nonce: FVNV6H0MKV0LdTsejR6q27fxusNFHsI6jUJZU-ZcpLMf5JGGsxk 2024-11-22 13:31:53,743:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:31:53,744:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-11-22 13:31:53,744:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:31:53,745:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:31:53,745:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:31:53,746:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:31:53,746:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:31:53,746:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:31:53,747:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:31:53,797:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 13:31:53,994:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:31:53,995:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-22 13:31:53,996:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-22 13:31:54,001:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:58 UTC. 2024-11-22 13:31:54,001:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:31:54,002:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:31:54,007:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0502CF10> Prep: True 2024-11-22 13:31:54,008:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0502CF10> and installer None 2024-11-22 13:31:54,008:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:31:54,024:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:31:54,025:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:31:54,027:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:31:54,499:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:31:54,499:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:31:54 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "GncGF_fHO0w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:31:54,500:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:32:00,411:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8772_key-certbot.pem 2024-11-22 13:32:05,990:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8770_csr-certbot.pem 2024-11-22 13:32:05,990:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:32:05,990:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:32:06,147:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:32:06,148:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: FVNV6H0M2kGGPQzI5urf8N1aIyWUwcxNXoQMD6qQ0xeJV4UGLLM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:32:06,148:DEBUG:acme.client:Storing nonce: FVNV6H0M2kGGPQzI5urf8N1aIyWUwcxNXoQMD6qQ0xeJV4UGLLM 2024-11-22 13:32:06,149:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:32:06,155:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME0ya0dHUFF6STV1cmY4TjFhSXlXVXdjeE5Yb1FNRDZxUTB4ZUpWNFVHTExNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jYYmyRtNE9hhB88BzUjbJHj72tr3KksNynWIjVtx9uiJVceMjUwxPAtzA8cfvbo8EqOZP7n8x3ze42wVIdfuGJh_SplDQQxs2x_-rFBW5Fk5P4hi7yT6pAxeMEpY7ogS-Ub0YH1WAX-sgClR71E-08YnsW8mAMo5NJcWh-LKFfNsMOb8c8kJZD_AT_9PUbZNNl7TFY8TIm7oauYlmZBQUEss_HNKv_DJmEdxBQ25gScDbOkzbkE2tK5yJAbKayXpb7lWkbd6l3yhWetHygNu4OqMB3oIV4zSNtVyURrMGNYJHXs-oYHs-yKAyD7DGDvbGKFy6E3DACFH_Pn6-YBp3g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-22 13:32:06,352:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2024-11-22 13:32:06,353:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:32:06 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335405237 Replay-Nonce: eYk8fkgTimDz3EZrZmYkHw6FoIqf1RPGFuRokqAOd87D34QAfas X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:47Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386225357" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335405237" } 2024-11-22 13:32:06,353:DEBUG:acme.client:Storing nonce: eYk8fkgTimDz3EZrZmYkHw6FoIqf1RPGFuRokqAOd87D34QAfas 2024-11-22 13:32:06,353:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:32:06,359:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386225357: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RpbUR6M0VaclptWWtIdzZGb0lxZjFSUEdGdVJva3FBT2Q4N0QzNFFBZmFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYyMjUzNTcifQ", "signature": "sCJX5rvkvN3sdgIVAtw-tdvnuwOkHoWD3Ed5C-HFjV9dtfQN9RWb0jkDmagr349UftQUJPIqfmIsWBm1Sqyq_mFk-DXQ6Ni6d18nDIO9T3md60rfZjcpCjD4WPkQR12SdVkdgkrN0T_JG-KOvrt0naQF-ZcqVfVQMTcE7lByf1GJpE5uDHoAjXFZc_PUWy84mrCS-q-GJGwHJ7UrS_YnJ1R4fDKD0z9UdWmQ3_iPlFYJPhQGLAMg3Ui12npGjtmmu-TsJW5fQXwmlkoQulyRbmdWqLWRaN-umeenwo7q-1aWkCPqMJ8kg-E3bGpg80nRD1LZflF0y-SgQBdU46UKIg", "payload": "" } 2024-11-22 13:32:06,521:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386225357 HTTP/1.1" 200 827 2024-11-22 13:32:06,522:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:06 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eYk8fkgT3KwHIS-r-hnAYsR65VCxBUtbWzmwo7MXyjB6WTXpO2Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:47Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386225357/ZOgoCA", "status": "pending", "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386225357/bpWWxw", "status": "pending", "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386225357/rcFeQQ", "status": "pending", "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU" } ] } 2024-11-22 13:32:06,522:DEBUG:acme.client:Storing nonce: eYk8fkgT3KwHIS-r-hnAYsR65VCxBUtbWzmwo7MXyjB6WTXpO2Y 2024-11-22 13:32:06,524:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:32:06,525:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-11-22 13:32:06,525:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:32:06,525:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:32:06,526:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:32:06,526:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:32:06,526:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:32:06,527:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:32:06,528:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:32:06,565:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 13:32:06,748:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:32:06,749:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2024-11-22 13:32:06,750:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2024-11-22 13:32:06,753:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:15 UTC. 2024-11-22 13:32:06,753:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:32:06,754:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:32:06,759:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0501DD30> Prep: True 2024-11-22 13:32:06,759:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0501DD30> and installer None 2024-11-22 13:32:06,760:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:32:06,764:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:32:06,765:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:32:06,767:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:32:07,222:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:32:07,223:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:07 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "H5nfhk1zfH4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:32:07,224:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:32:13,091:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8773_key-certbot.pem 2024-11-22 13:32:18,705:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8771_csr-certbot.pem 2024-11-22 13:32:18,705:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:32:18,705:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:32:18,854:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:32:18,854:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: gtp33icHX8OWz-mpzWF5gFYQXkcGmwgSq5OrB6212xVioU324sg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:32:18,855:DEBUG:acme.client:Storing nonce: gtp33icHX8OWz-mpzWF5gFYQXkcGmwgSq5OrB6212xVioU324sg 2024-11-22 13:32:18,855:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:32:18,861:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0hYOE9Xei1tcHpXRjVnRllRWGtjR213Z1NxNU9yQjYyMTJ4VmlvVTMyNHNnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "m0GHex6AlSqyCSbV7jINHASDU5FhuSFgiZ66W-JF1W1u10-vHlVZmiP2Z0iNsxxk3R7xqZ2nzjVeXd1_TMjyb7AVaLWtDGRoRxFwqXYb8ZjKXvXvzIB3GKMc84HkEXw_uVGnfNh8qVlYJADz1F3K4Z8rwrPrh5CgQ0l-g8JbEvNcj_x3N4ewwONH3FzbZM6JZ2Pa0Tx8-AQTo03KGZ8giNuAfMk9a4B-DyMJPU40DdC0hc4c2bvEGwKz1ve0c4rFJq4m8tDjFGmrahbp0QSEZ3IV89zoN6LukAKySQwZXrMmG2d7Rz4jclTx5h-RAupMqDCfsJYNxYoR-HbthSFTbg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-22 13:32:19,104:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2024-11-22 13:32:19,105:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:32:19 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335446687 Replay-Nonce: gtp33icHoj05lOUH0nzWqOjjD8KOIuDt4qFJa2xBcSrCG78KySI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:59Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386288977" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335446687" } 2024-11-22 13:32:19,105:DEBUG:acme.client:Storing nonce: gtp33icHoj05lOUH0nzWqOjjD8KOIuDt4qFJa2xBcSrCG78KySI 2024-11-22 13:32:19,105:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:32:19,111:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386288977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0hvajA1bE9VSDBueldxT2pqRDhLT0l1RHQ0cUZKYTJ4QmNTckNHNzhLeVNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYyODg5NzcifQ", "signature": "hXqAEvybmDpaF4_6-VyJjdDyxZim9MqK2zVKzqBU0dG57Ov47rsR8hL0mqci3MH41H32bHAShZWytf22L8n7NSllrWt-hW8o2BeAkbSX4bYBcB0mLe7HdmXa2H78CTY9tezjdsqi33iMSgSPZfxmDwU539CRfgYewj1wtgRzP4jtqRfXIyLBRKeqsiYCPbCb3V4yIKkUo3KWQSbP_3JUpsJPzUlYxhTTVNArE49xU-ONWM4QO_VbuWnW7ac-_EgoRpB79AF1qw6QPlAS9D8mhJJMXjAvGuYYnQQZxyes6-icMwei5pRbiQh598tQSMm3NabMJbkXQEztdz1AWAbMJA", "payload": "" } 2024-11-22 13:32:19,266:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386288977 HTTP/1.1" 200 825 2024-11-22 13:32:19,266:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:19 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: gtp33icHpuJBHrMN37ochq_Bl0iTX8YpyR-IYzVwZuyud92cz0E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386288977/jzYzOg", "status": "pending", "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386288977/74HdZw", "status": "pending", "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386288977/qrrE6g", "status": "pending", "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE" } ] } 2024-11-22 13:32:19,267:DEBUG:acme.client:Storing nonce: gtp33icHpuJBHrMN37ochq_Bl0iTX8YpyR-IYzVwZuyud92cz0E 2024-11-22 13:32:19,268:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:32:19,269:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-11-22 13:32:19,269:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:32:19,270:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:32:19,270:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:32:19,270:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:32:19,271:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:32:19,271:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:32:19,272:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:32:19,321:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 13:32:19,505:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:32:19,506:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 13:32:19,507:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 13:32:19,511:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:37 UTC. 2024-11-22 13:32:19,511:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:32:19,512:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:32:19,517:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0501D450> Prep: True 2024-11-22 13:32:19,517:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0501D450> and installer None 2024-11-22 13:32:19,517:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:32:19,522:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:32:19,523:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:32:19,526:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:32:19,971:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:32:19,972:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:20 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "XaiCn1BnwsY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:32:19,972:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:32:25,736:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8774_key-certbot.pem 2024-11-22 13:32:31,364:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8772_csr-certbot.pem 2024-11-22 13:32:31,365:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:32:31,365:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:32:31,514:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:32:31,514:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: zIaIDaiT5-eks2UQHpXKsfa0HiJ3-U77PLq3D2bnkb1YI93JrXA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:32:31,515:DEBUG:acme.client:Storing nonce: zIaIDaiT5-eks2UQHpXKsfa0HiJ3-U77PLq3D2bnkb1YI93JrXA 2024-11-22 13:32:31,515:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:32:31,521:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVQ1LWVrczJVUUhwWEtzZmEwSGlKMy1VNzdQTHEzRDJibmtiMVlJOTNKclhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BlxeuOyvB0TAAF_Gfz94VkPjMTMNhOm04zLs_fn9fAyf7G9XQLPI16ykc_epVWcGIcPnGF9iTQVufUoj0WzlIIfq09qB3vLhSX88UjnpiFGoRBp6uEQmYutzy_fIVugUThK2Q9oa0IySb1r6Xs30JY6nbUesAhNKUnVoYZIWC6C0_nP0FeBW_aFtgm8WD7dxvg5HMlNd6ntK0YUw9E0v6Q8dHa2WDJ9-k6IvdnC9z6oI39fPyrTzp3a15tOGPgDHG_Sl0A06IffbCsaNfpaPjlvEHnQtekcp7p8C0OmGTBFZKpZJLb0fGgHPjh6oOfT9WBonvRhYpJiJ5ksbgaSLaQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-22 13:32:31,703:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2024-11-22 13:32:31,703:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:32:31 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335505847 Replay-Nonce: zIaIDaiTIhK5RcC4d_jSNE8NG6GWi2QiJ2W1vAM2qd-foVPQUaE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:12Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386373457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335505847" } 2024-11-22 13:32:31,703:DEBUG:acme.client:Storing nonce: zIaIDaiTIhK5RcC4d_jSNE8NG6GWi2QiJ2W1vAM2qd-foVPQUaE 2024-11-22 13:32:31,704:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:32:31,710:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386373457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRJaEs1UmNDNGRfalNORThORzZHV2kyUWlKMlcxdkFNMnFkLWZvVlBRVWFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYzNzM0NTcifQ", "signature": "q_RCBJ2hJcLOzNkUCqVARyoY4wNlkVv5cz0qB8Mbd6-clA_BjBcNyh6Oy8-AfNiY20y77si0AbMi_g7Ht72DJMh3Aqx_LoNqh2MsXaqfS_1Bjzw5fXrL18efnW3j5iRl5ND8epnm98LE4odJcm3utjqsXd4Wl9BGsyZwp82Kq1YW3zVZ372CiWKG9PGYD4prYb6Y_k18gSLvgChtJBQQ6Y8ww7VyIXSSY1r8Fo04_8dOBCRwiJmNve4E4ZMplGhRUu_w7qObEuDVMJRHweWeMX4qV2EFxRQInMiCqDvRpeS_SdcMT-yzj58dceocUuqSjmtqwRmsIdVNGa0PjZTDZg", "payload": "" } 2024-11-22 13:32:31,863:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386373457 HTTP/1.1" 200 824 2024-11-22 13:32:31,864:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:32 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: zIaIDaiTPQu3BX6TDjFilb6Bf-J5Rn1seMrYuFNftCCmjMcYZIk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:12Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386373457/CBmaOg", "status": "pending", "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386373457/d3Fmcw", "status": "pending", "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386373457/JJFsqQ", "status": "pending", "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI" } ] } 2024-11-22 13:32:31,864:DEBUG:acme.client:Storing nonce: zIaIDaiTPQu3BX6TDjFilb6Bf-J5Rn1seMrYuFNftCCmjMcYZIk 2024-11-22 13:32:31,866:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:32:31,867:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-11-22 13:32:31,867:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:32:31,867:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:32:31,868:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:32:31,868:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:32:31,868:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:32:31,869:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:32:31,870:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:32:31,917:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-11-22 13:32:31,918:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:32:31,918:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-11-22 13:32:31,925:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-11-22 13:32:31,927:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-11-22 13:32:31,928:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-11-22 13:32:31,928:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-22 13:32:31,928:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-11-22 13:32:31,930:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-22 13:32:31,974:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 13:32:32,174:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:32:32,176:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 13:32:32,176:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 13:32:32,182:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:56 UTC. 2024-11-22 13:32:32,182:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:32:32,182:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:32:32,188:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x046BCF30> Prep: True 2024-11-22 13:32:32,188:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x046BCF30> and installer None 2024-11-22 13:32:32,188:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:32:32,193:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:32:32,194:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:32:32,196:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:32:32,682:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:32:32,682:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:32 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_Ij8VvvIOX0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:32:32,683:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:32:38,288:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8775_key-certbot.pem 2024-11-22 13:32:43,860:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8773_csr-certbot.pem 2024-11-22 13:32:43,861:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:32:43,861:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:32:44,022:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:32:44,023:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: FVNV6H0MGjieCbpCW1I69T5yW9y9ARkqXnQ3PtmUwBHxtFIsmlI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:32:44,023:DEBUG:acme.client:Storing nonce: FVNV6H0MGjieCbpCW1I69T5yW9y9ARkqXnQ3PtmUwBHxtFIsmlI 2024-11-22 13:32:44,024:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:32:44,030:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1HamllQ2JwQ1cxSTY5VDV5Vzl5OUFSa3FYblEzUHRtVXdCSHh0RklzbWxJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pfLMIDAiGVtL3mMvRZ2-COph2Ma1BDZK1tbtrP4ciPpdTCs7qcCHjvoAwtfpOOXko9Va7I6UL2s-oCS_-H8PsD5a7lVZJzGKl5WUPc2Y77T2MrEb88LkB8zeG7jkK9fvsLApfwSdroNpPkC_zGy-FtfybbCP-zkjh3_M-Ii_X6ReFxe-N_doWtsHgVSnkgwRPrn19SZeamRQ6W8yOQr0jKjcKqr8Rxl5O4qVmkNU_g-pR6LO512zJSj4ETldCZSIXgGmQ9B9SSaCahvpMPvKVjAZJBK9M4D3yRN7YKqOfRQbWNYiqX6U8K4jYuIzWjtUX22qxNBcu9J4qUsYP1KHVQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-22 13:32:44,219:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2024-11-22 13:32:44,220:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:32:44 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335553997 Replay-Nonce: FVNV6H0MBvH0LuhhL6O96-sJJP4jCIHlrxq08nDQA5N8Di-g_E8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:24Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386447927" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335553997" } 2024-11-22 13:32:44,220:DEBUG:acme.client:Storing nonce: FVNV6H0MBvH0LuhhL6O96-sJJP4jCIHlrxq08nDQA5N8Di-g_E8 2024-11-22 13:32:44,221:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:32:44,227:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386447927: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1CdkgwTHVoaEw2Tzk2LXNKSlA0akNJSGxyeHEwOG5EUUE1TjhEaS1nX0U4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY0NDc5MjcifQ", "signature": "V2RxTsLgYiQbfuVuQw87V3Cx86_Hq3DrU9OsVXhuDhNyXImVp_LhJefHWsHRXkDcgPkmmvQVEt1TNOHCZPt1-DFH4PD7k6AiFNI2pfzCFOS1hHad4V4TqhZMFwQPxPtLGQjJEAx9kUBUpRrpzrRmxtxzBu2FmyCvR9ESwR73lGJf9hEHjDUwYL1InyQAAa_WfezmSqcIWqfgZ3bZgvicgKQ0r4YEAKiSE3bb4hXmyEaIKlUTL9q0G5vnfHbXYc1-j_zVSd7lweagNx5MauX0gYcSMB5DfydARUtdIu8U1FQs8XkZ8oPx7IFTRGTzgN4CCpi-IRvc3BewjIHhgRDMfA", "payload": "" } 2024-11-22 13:32:44,390:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386447927 HTTP/1.1" 200 829 2024-11-22 13:32:44,391:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:44 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eYk8fkgTKLbEdvNRvKKz6YflQ_I2bBJj0g5n8VzSyi-YATEDmbQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:24Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386447927/PLs0Mg", "status": "pending", "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386447927/lliEPw", "status": "pending", "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386447927/eNwFHQ", "status": "pending", "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY" } ] } 2024-11-22 13:32:44,391:DEBUG:acme.client:Storing nonce: eYk8fkgTKLbEdvNRvKKz6YflQ_I2bBJj0g5n8VzSyi-YATEDmbQ 2024-11-22 13:32:44,392:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:32:44,392:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-11-22 13:32:44,393:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:32:44,393:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:32:44,394:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:32:44,394:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:32:44,394:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:32:44,395:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:32:44,396:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:32:44,435:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 13:32:44,634:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:32:44,635:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 13:32:44,636:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 13:32:44,641:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:15 UTC. 2024-11-22 13:32:44,641:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:32:44,641:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:32:44,646:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D2BE50> Prep: True 2024-11-22 13:32:44,646:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D2BE50> and installer None 2024-11-22 13:32:44,646:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:32:44,651:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:32:44,652:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:32:44,654:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:32:45,134:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:32:45,135:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:45 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "MKD-zlOGm4s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:32:45,136:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:32:50,995:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8776_key-certbot.pem 2024-11-22 13:32:56,527:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8774_csr-certbot.pem 2024-11-22 13:32:56,528:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:32:56,528:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:32:56,687:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:32:56,688:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: FVNV6H0MSt8VqJpba-N__wJdrVL8QzuJ1ZJptHb26hxOdL-Jpjg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:32:56,688:DEBUG:acme.client:Storing nonce: FVNV6H0MSt8VqJpba-N__wJdrVL8QzuJ1ZJptHb26hxOdL-Jpjg 2024-11-22 13:32:56,688:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:32:56,696:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1TdDhWcUpwYmEtTl9fd0pkclZMOFF6dUoxWkpwdEhiMjZoeE9kTC1KcGpnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "St-QvIr1-ixZKS8_pnU9PPIfESKUx4gl7p5jI-Ex2OgVgAKa80DNIhimXPHnOFN8p5uSMJ58Uy-uvQVz538C4ZyCCgSbyG3XpH3103VCXVSLX0oURPf2qykDNyDjAM951zEg2Q1OKz-sJx1NUpG9Zcqt-vzDRL4_iTr27zC-0HeZZHiZ9zC0TxFGmeiIbJBAQHaWXx3Y_5HWB1LGQAcVzpdymFKyjONff78jTCyCuPEu9FyNFVO6-Wt56_w2rT0p22bKRWfFRIfcGHHXzS61HwZEERjUxGyPiesmr65pyPSVBhTrpMCAk7WqdO5mhRUJb3UztGqaSi8NN4PRqRz3Gw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-22 13:32:56,901:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2024-11-22 13:32:56,902:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:32:57 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335602617 Replay-Nonce: FVNV6H0MuNrEgP2skyFB27SI7CrbkjkjS981A1iql38whnPOMAw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:37Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386519187" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335602617" } 2024-11-22 13:32:56,902:DEBUG:acme.client:Storing nonce: FVNV6H0MuNrEgP2skyFB27SI7CrbkjkjS981A1iql38whnPOMAw 2024-11-22 13:32:56,902:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:32:56,908:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386519187: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME11TnJFZ1Ayc2t5RkIyN1NJN0NyYmtqa2pTOTgxQTFpcWwzOHdoblBPTUF3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY1MTkxODcifQ", "signature": "M2TpTy7_RIQNHR4sWurkaoVwFlBG-OYG47hPRDlxeKz_SsfQMnKk6iTH8clgcnJaZBmGcFuEtFyK-ka0PHY38IgD851ALyY3NjLx4eZMzbX1xR5KRu-Zdfa1aJj7CM7knHRNPI45OeaiFsJCIDnDd_zBT9w2fea5_dzu8_Yu6_bRkI7WEheoKikHmgDIXGDEAh_JKT-B8MrrIl2sJDg2fSzLFuXi-dG10uuQCLFb7PihSu5Jz0QH0zi18npg1Q4FSKHA2q6UB1COZ8WUU0phZJwEe0zKGDjhxz4lYqloHfj_LBx-H9OJRgXkbaI5HRWxaoV2q1MyQYgnpnfqnkVo0Q", "payload": "" } 2024-11-22 13:32:57,074:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386519187 HTTP/1.1" 200 828 2024-11-22 13:32:57,075:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:57 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eYk8fkgTGpU78qByZoDEq-cACiKR0vSyhuqZciSokByOg1xkmaI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:37Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386519187/XcgphA", "status": "pending", "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386519187/XHeZAA", "status": "pending", "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386519187/-jLYlg", "status": "pending", "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk" } ] } 2024-11-22 13:32:57,075:DEBUG:acme.client:Storing nonce: eYk8fkgTGpU78qByZoDEq-cACiKR0vSyhuqZciSokByOg1xkmaI 2024-11-22 13:32:57,075:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:32:57,076:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-11-22 13:32:57,076:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:32:57,076:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:32:57,077:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:32:57,077:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:32:57,078:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:32:57,078:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:32:57,079:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:32:57,122:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 13:32:57,295:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:32:57,296:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-11-22 13:32:57,297:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-11-22 13:32:57,302:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:32 UTC. 2024-11-22 13:32:57,302:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:32:57,302:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:32:57,307:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D31250> Prep: True 2024-11-22 13:32:57,308:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D31250> and installer None 2024-11-22 13:32:57,308:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:32:57,312:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:32:57,313:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:32:57,316:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:32:58,073:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:32:58,074:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:32:58 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_3J3DCk4QTo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:32:58,074:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:33:04,036:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8777_key-certbot.pem 2024-11-22 13:33:09,671:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8775_csr-certbot.pem 2024-11-22 13:33:09,671:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:33:09,672:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:33:09,820:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:33:09,821:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:33:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: zIaIDaiTfc0H1CUp6PsshxXyD1UezfVkbyQd_abjaN5g-T3dJCw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:33:09,821:DEBUG:acme.client:Storing nonce: zIaIDaiTfc0H1CUp6PsshxXyD1UezfVkbyQd_abjaN5g-T3dJCw 2024-11-22 13:33:09,821:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:33:09,827:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRmYzBIMUNVcDZQc3NoeFh5RDFVZXpmVmtieVFkX2FiamFONWctVDNkSkN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FvnZ7aqCBfg2ky0cs_H3y6S2Hqf5gFERH0QdLQiVfgk9OPZEa35ajgX8sUXtBiZdk-YgvqIBJqeArCXL7i0tQ7LoKgC4t_47LuNIGi4iF1PWd14JGMKx3Ilhl4PLc9an73OVsV9GeWHR8wTUy1nyBFdcmnlL0SJDixUzVjjZcRq463ZEglsYxa-5eL2BPs90dErvtXGSFCMYoZ_eBtiEaPhWC8IwDMYdt6t13FBdrGoY8qZg4eNwjEXpH3zEGuwVm5mdWHMqy69d1dNhrB7ALxOXFRoef03KpQzG2lbT9Yr5fXOL913B6bRsX5WFe1FlOW1-gd8j4a3JflJRUvUL4Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-22 13:33:10,014:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2024-11-22 13:33:10,015:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:33:10 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335648247 Replay-Nonce: gtp33icHVP8ANY2LfStQXCDWbkDmn48QJD6_hdRdbntNH7oMFbA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:49Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386588377" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335648247" } 2024-11-22 13:33:10,015:DEBUG:acme.client:Storing nonce: gtp33icHVP8ANY2LfStQXCDWbkDmn48QJD6_hdRdbntNH7oMFbA 2024-11-22 13:33:10,015:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:33:10,021:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386588377: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0hWUDhBTlkyTGZTdFFYQ0RXYmtEbW40OFFKRDZfaGRSZGJudE5IN29NRmJBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY1ODgzNzcifQ", "signature": "RccwJY9J934vtaGcWSkmWQxY9Z46lm9rG6Y8g3WDrTTMjsJ6hZkFFfC01ivbmt_QICz0Cev2fct46AMa2IBLTz4yGrPxnhoCwQ8Ddljjceh5Su0f27X4cm0Xhhh6oWsK0kR9lfvMi3aG-lc2Eza7mXKCNDaFQuSTvFy2LWg75hZgCZtJiRgWZuNzQ98dMEU_FdXlVzTt8uQz8TwoibnOQR5DfB6kcPplsYJ74nIAmiozhNs91Dkh4XKx5uFPk-q0NeIlOQvhxmGFtohBm1oPtVsZbTYBtIJMuqYPhKeDnjMJGN6koZxzCGN45QugaT84UaFzdyCn3dUHh0naYVZpSg", "payload": "" } 2024-11-22 13:33:10,174:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386588377 HTTP/1.1" 200 827 2024-11-22 13:33:10,175:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:33:10 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: zIaIDaiTvxrSQRSK7xsn4WqjVLabwBIONFKf8kzXdbeVvQgzpyU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:49Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386588377/67ZXmA", "status": "pending", "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386588377/mNBDgA", "status": "pending", "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386588377/hneKNA", "status": "pending", "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ" } ] } 2024-11-22 13:33:10,175:DEBUG:acme.client:Storing nonce: zIaIDaiTvxrSQRSK7xsn4WqjVLabwBIONFKf8kzXdbeVvQgzpyU 2024-11-22 13:33:10,176:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:33:10,176:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-11-22 13:33:10,177:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:33:10,177:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:33:10,178:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:33:10,178:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:33:10,178:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:33:10,179:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:33:10,180:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:33:10,231:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 13:33:10,433:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:33:10,434:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-11-22 13:33:10,435:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-11-22 13:33:10,440:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:52 UTC. 2024-11-22 13:33:10,440:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:33:10,440:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:33:10,445:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x047643B0> Prep: True 2024-11-22 13:33:10,445:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x047643B0> and installer None 2024-11-22 13:33:10,445:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:33:10,450:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:33:10,451:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:33:10,453:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:33:10,907:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:33:10,908:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:33:11 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "s-CX9EKbCBg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-22 13:33:10,909:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:33:17,231:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8778_key-certbot.pem 2024-11-22 13:33:22,850:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8776_csr-certbot.pem 2024-11-22 13:33:22,851:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:33:22,851:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:33:23,000:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:33:23,001:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:33:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: zIaIDaiTGWC00JyHEe_soUrcbxiAS92o3za20fu3ZI3PG8fUeDE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:33:23,001:DEBUG:acme.client:Storing nonce: zIaIDaiTGWC00JyHEe_soUrcbxiAS92o3za20fu3ZI3PG8fUeDE 2024-11-22 13:33:23,001:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:33:23,007:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRHV0MwMEp5SEVlX3NvVXJjYnhpQVM5Mm8zemEyMGZ1M1pJM1BHOGZVZURFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dONapsX02ZQojshjSWnd1IQcF42TkcpuYdspTruAgDE4mQwDOUNweSLp4ie9bnyuff_lA8PE9XFxfiBFlTBV0Oe8-LeFRGZYYozEmMgsIlRS2POTMrVs_tjemFLQx0-AsKIju1pf4czHwU4fgazIz7EodZIE9NRZRQxZ8tQPEWnsriNDGOZ5HSjnjTUwnz5HlqbvMhquluMz4js7ckmKUNrN_RX5cIN3zUYerEpMlYcNtryzg6em0KNcWQUhX4R7ny2NdOMZqBvWeKFVqP7Jow_GKiuH35Gvqvi7GB3e3wHbFYou3JQDZ8XsPDMteFeN1qFYgcVvWPXEZrzicsZlxQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-22 13:33:23,200:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-22 13:33:23,201:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:33:23 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335696957 Replay-Nonce: gtp33icH0EQDR3xyYeplq_u1Bw5zgfdHeza8-BmUNCvDCr_3txQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:33:02Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386660297" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335696957" } 2024-11-22 13:33:23,201:DEBUG:acme.client:Storing nonce: gtp33icH0EQDR3xyYeplq_u1Bw5zgfdHeza8-BmUNCvDCr_3txQ 2024-11-22 13:33:23,201:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:33:23,209:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386660297: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0gwRVFEUjN4eVllcGxxX3UxQnc1emdmZEhlemE4LUJtVU5DdkRDcl8zdHhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY2NjAyOTcifQ", "signature": "l0kcndtgKF5vXZ-R8rYERNoDkYO-BNV7EpJK8mX-OLzONMLOovHzYg-1SO565JsKQRfm-LMdrXHD9Y8buU39DW2B-MeCwbkhsEKQC4Yi2c_EzZIKh0xn76qM42ZCc6-8f4aFIBlnuxBtUgqC6394F80YIkDfCaqtCF7X0JhGPoRR7Gub2qpzI3TyuSUXyScj9t2Z7lef110ZTv7uXscYXPE-2XwKrG-0fH_8ADk48hhpXKFNlwsQNdSs4CulrmkkAu6AmALhgSctdWjho3xUXd8yU4pcUNe8v-NEw8_7MqyzhB8N00RPlY92l0qX3w0JoCDXAEj0skDxvwJr47xDKw", "payload": "" } 2024-11-22 13:33:23,364:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386660297 HTTP/1.1" 200 823 2024-11-22 13:33:23,365:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:33:23 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: gtp33icHfuhp6Kj1KhOTT88jF_blRft_EExaZbfQlfGyj4uO9t4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:33:02Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386660297/9adDwA", "status": "pending", "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386660297/hz_bKw", "status": "pending", "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386660297/Jd3mYQ", "status": "pending", "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM" } ] } 2024-11-22 13:33:23,365:DEBUG:acme.client:Storing nonce: gtp33icHfuhp6Kj1KhOTT88jF_blRft_EExaZbfQlfGyj4uO9t4 2024-11-22 13:33:23,366:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:33:23,366:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-11-22 13:33:23,367:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:33:23,367:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:33:23,368:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:33:23,368:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:33:23,368:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:33:23,369:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:33:23,370:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:33:23,419:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 13:33:23,607:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 13:33:23,608:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 13:33:23,609:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 13:33:23,614:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:10 UTC. 2024-11-22 13:33:23,614:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:33:23,614:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:33:23,619:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0501E3D0> Prep: True 2024-11-22 13:33:23,619:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0501E3D0> and installer None 2024-11-22 13:33:23,619:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:33:23,625:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:33:23,626:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:33:23,628:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:33:24,097:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:33:24,098:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:33:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "kM4IS3ilA4o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:33:24,098:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:33:30,361:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8779_key-certbot.pem 2024-11-22 13:33:35,963:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8777_csr-certbot.pem 2024-11-22 13:33:35,964:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:33:35,964:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:33:36,120:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:33:36,121:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:33:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eYk8fkgT7uzcFYj0TK4QnIAOS7BYdznpWSVB9coFSmzVeB4poGM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:33:36,121:DEBUG:acme.client:Storing nonce: eYk8fkgT7uzcFYj0TK4QnIAOS7BYdznpWSVB9coFSmzVeB4poGM 2024-11-22 13:33:36,121:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:33:36,129:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1Q3dXpjRllqMFRLNFFuSUFPUzdCWWR6bnBXU1ZCOWNvRlNtelZlQjRwb0dNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "UzvTssXSIg_pd1Mo4cMFvCeH3K7ZPjEbKY7YretHbxu6IplDP6NYwKA0tAZzVZ9dFwGoVv3Jid5HHgAFAoKS7jDxZcwXT199MU6L8Hu3Ni-JPVhxW1IgAPiFcsTbQzbm5P-lYzukn63oORwGEzq2Xs1fH4QMWL_5c-HTWY8ZFF_0AoiHhU-2csD0YjxJrqaY1XHOzZZhmNAEGirWdHAOWvGbnR-0RJWyhDrjFJFeC4I07imabcqg404Fr9lYTrfY8O36CTCLf7SAYrprqq33bNm2fIifScxWsHP8Hmo3pS0iYyf2i_mZbOWZInjcO7TRvWu3VK27t5yCGtQZkt9Rng", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-22 13:33:36,323:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-22 13:33:36,324:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:33:36 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335757157 Replay-Nonce: FVNV6H0M1Vvy6Ik7M2iLBLRjJJnwJNJI4NTpvE0EDilrdf-MVy4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:33:15Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386749437" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335757157" } 2024-11-22 13:33:36,324:DEBUG:acme.client:Storing nonce: FVNV6H0M1Vvy6Ik7M2iLBLRjJJnwJNJI4NTpvE0EDilrdf-MVy4 2024-11-22 13:33:36,324:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:33:36,330:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386749437: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME0xVnZ5NklrN00yaUxCTFJqSkpud0pOSkk0TlRwdkUwRURpbHJkZi1NVnk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY3NDk0MzcifQ", "signature": "A0RI5FIFfDyFPgugScg6Ot-POmM9UDOiXn5Je56KfbPDB0HAoDzsYMVGNVAaIzlWh3p7i54CDsimFyMYosbbSQ8JtUA4aNsfmIE0aWwEqYd7W-Z1tpsTTLo4DTl3F0BvdZG7C7jkvcWdJZCSbmiZGhpDL1SvmVPENIkb8Ffym7836jA-PDrJ6V0haILBcfkcpHEA9uRE6khT-rclnv07Xu3kcy95mEFSmc6I8tpSNY1_CFcDlXwoNtKxTXfF5VE5rDyxd0FWkteHm356YyYOT-_GCMP8MXFGyCrJtPm4gZJiutxGf1GaaH-vy0ZIPFbsybaObnV_KGxh8QlkY3LzmA", "payload": "" } 2024-11-22 13:33:36,493:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386749437 HTTP/1.1" 200 823 2024-11-22 13:33:36,494:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:33:36 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: FVNV6H0MEB52hyVWl6BLFSQtz1Nl0upQHS4uQo4nLdMcI4_DF8Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:33:15Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386749437/RcBV3Q", "status": "pending", "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386749437/hizs-Q", "status": "pending", "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386749437/ODSfIw", "status": "pending", "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0" } ] } 2024-11-22 13:33:36,494:DEBUG:acme.client:Storing nonce: FVNV6H0MEB52hyVWl6BLFSQtz1Nl0upQHS4uQo4nLdMcI4_DF8Y 2024-11-22 13:33:36,494:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:33:36,494:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-11-22 13:33:36,495:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:33:36,495:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:33:36,496:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:33:36,496:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:33:36,496:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:33:36,497:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:33:36,498:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:33:36,548:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 13:33:36,861:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 514 2024-11-22 13:33:36,873:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-22 13:33:36,874:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-22 13:33:36,879:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:32 UTC. 2024-11-22 13:33:36,879:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 13:33:36,879:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 13:33:36,884:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0478BFB0> Prep: True 2024-11-22 13:33:36,885:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0478BFB0> and installer None 2024-11-22 13:33:36,885:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 13:33:36,891:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-11-22 13:33:36,891:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 13:33:36,894:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 13:33:37,372:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 13:33:37,372:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:33:37 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5dY9pPp5pY8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 13:33:37,373:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 13:33:43,049:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8780_key-certbot.pem 2024-11-22 13:33:48,575:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8778_csr-certbot.pem 2024-11-22 13:33:48,576:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 13:33:48,576:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 13:33:48,736:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 13:33:48,737:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:33:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: FVNV6H0M82nyaG6MJmeB9P5pQk9TfKdWZsyjqlX3kMasUCowI-o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 13:33:48,737:DEBUG:acme.client:Storing nonce: FVNV6H0M82nyaG6MJmeB9P5pQk9TfKdWZsyjqlX3kMasUCowI-o 2024-11-22 13:33:48,737:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 13:33:48,743:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME04Mm55YUc2TUptZUI5UDVwUWs5VGZLZFdac3lqcWxYM2tNYXNVQ293SS1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tcdb8vXidwEJowjmQPo9ZuAygLz2MwFqvnbaqJNqvNKnK0H_zBKGxN7P6PGSCVE86X7q3xRV82Ut0cKiZx5V180AjUH0rn8pyzuOGuO5Wsj2hO4qVyUXwMeabdT9MO9ifr30qDXj1Xk5DRR7DdSZrzs0I6RhYm8vEeLo-rYteXV17ywlE3fP5iF00R6NJqJC1RyL5z48ifCRY-q_w0KnC8cb2h-W-UnsD7yIDlQYjfXNawYUratFB2a24AMBlB_S9vITaL4m2q-oReKm7N5Bbfkka1ULT7LWSFeO1czfJIxzFJxLTpJH8cFTKZ-r0FXNVgIv45TXG4Vygi7kJh71dg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-22 13:33:48,940:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-22 13:33:48,941:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 12:33:49 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335805657 Replay-Nonce: FVNV6H0MxRQ4PiPns_C63sR-Q7U-aD6PvzR1bN7Pu6gpu-hBYIw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:33:28Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386819677" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335805657" } 2024-11-22 13:33:48,941:DEBUG:acme.client:Storing nonce: FVNV6H0MxRQ4PiPns_C63sR-Q7U-aD6PvzR1bN7Pu6gpu-hBYIw 2024-11-22 13:33:48,941:DEBUG:acme.client:JWS payload: b'' 2024-11-22 13:33:48,947:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386819677: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME14UlE0UGlQbnNfQzYzc1ItUTdVLWFENlB2elIxYk43UHU2Z3B1LWhCWUl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY4MTk2NzcifQ", "signature": "ZD44CgAg0D5JDgdN9BSHZSOsNVmXG_YcgvAp99jedRQUa0rooFl625scHm0feY_u9WFInPy5nT5JONNsC39kZu6nLVlWsnBn89s0E6fSObCO9-Eg9NUOO_t5ANqhuXjVHGfT6adUzB_0_20RI49TeyfhB03UuaQDjrU0ycIPSYD5_vU6NL-XyjLA2zEDFW6baZACMuBfunjqUDHRSb-qputo7bBK5UIjbZtbLBm209GG-NGx46s_AKKGdbcy2p4o7bxqxqlw_0ywiVjn5OY-Pz9zcIv8XZU-gxcZ2KoLocj-QiPVKU8hagiH8iUYA-id7mKZ28yxQLZxWhaUBnUpuQ", "payload": "" } 2024-11-22 13:33:49,110:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386819677 HTTP/1.1" 200 823 2024-11-22 13:33:49,110:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 12:33:49 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: FVNV6H0M9e6m2Qy4RO6StFQ3yCmuOQHZaG4FeKDndM9oqPvVFLo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:33:28Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386819677/-G9CyQ", "status": "pending", "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386819677/7gZi0Q", "status": "pending", "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386819677/-esrVQ", "status": "pending", "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU" } ] } 2024-11-22 13:33:49,111:DEBUG:acme.client:Storing nonce: FVNV6H0M9e6m2Qy4RO6StFQ3yCmuOQHZaG4FeKDndM9oqPvVFLo 2024-11-22 13:33:49,111:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 13:33:49,112:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-11-22 13:33:49,112:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 13:33:49,112:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 13:33:49,113:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:33:49,113:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 13:33:49,113:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 13:33:49,114:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 13:33:49,115:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 13:33:49,115:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-11-22 13:33:49,116:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-11-22 13:33:49,127:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module> sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-11-22 13:33:49,128:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)