2024-11-22 07:24:19,132:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-11-22 07:24:19,132:DEBUG:certbot._internal.main:Arguments: [] 2024-11-22 07:24:19,132:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-22 07:24:19,836:DEBUG:certbot._internal.log:Root logging level set at 20 2024-11-22 07:24:19,837:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-11-22 07:24:19,877:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-11-22 07:24:19,991:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 07:24:20,191:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:24:20,192:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-11-22 07:24:20,197:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-11-22 07:24:20,206:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:06 UTC. 2024-11-22 07:24:20,206:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:24:20,206:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:24:20,212:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:24:20,212:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:24:20,212:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:24:20,219:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:24:20,220:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:24:20,222:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:24:20,685:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:24:20,685:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:24:20 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "teDdcpwkTFk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-22 07:24:20,686:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:24:26,777:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8753_key-certbot.pem 2024-11-22 07:24:32,571:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8751_csr-certbot.pem 2024-11-22 07:24:32,572:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:24:32,572:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:24:32,721:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:24:32,721:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:24:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTZd4FBTglAZqbVm2Nzm6JmPGw_09R7Pm8GSxOvLicT2g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:24:32,722:DEBUG:acme.client:Storing nonce: zIaIDaiTZd4FBTglAZqbVm2Nzm6JmPGw_09R7Pm8GSxOvLicT2g 2024-11-22 07:24:32,722:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:24:32,728:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRaZDRGQlRnbEFacWJWbTJOem02Sm1QR3dfMDlSN1BtOEdTeE92TGljVDJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pAQwnQvdThZ4irbwtZU8SLX_P0YyKMk4H15frbvRRgpAQn6uruorizEfcDL1ExF8kMR4wR0CcAyIFRB57lEDftMinHnwqKCFOwtAifrxRhEJgUp7Fa5cGUVpRQMIUPfyGHRRUqIz4JSpl7-AHvtuLnGw-eb57KPmPZvMocNAtz7IKiba6wF9Dg5g0-ePnHRmwcd9_VLHqZsvCHSEAoam37tkq4S3f7lQoII2zhbyR5eaUji1s-N9APnD_bK2P3x_Kv3zexB9pjh3n95QvruK7RmhTdTyv70lbX7odo8f6KYqVNtCmr6ORiNeqpkxvcproMW95VwaVqOI8nhDBLQrqw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-22 07:24:32,895:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2024-11-22 07:24:32,895:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:24:33 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335168147 Replay-Nonce: zIaIDaiTsxOIkeEimQGGrr2fhCXCIEpnYBFnz7zQEPX66DIFnnU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:30:42Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385871837" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335168147" } 2024-11-22 07:24:32,896:DEBUG:acme.client:Storing nonce: zIaIDaiTsxOIkeEimQGGrr2fhCXCIEpnYBFnz7zQEPX66DIFnnU 2024-11-22 07:24:32,896:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:24:32,902:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385871837: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRzeE9Ja2VFaW1RR0dycjJmaENYQ0lFcG5ZQkZuejd6UUVQWDY2RElGbm5VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODU4NzE4MzcifQ", "signature": "DQNPpZ7aVnCsW91HXYcGPRv3h5lHTKEVk-lcnej9541T62PjEB37qVgWkT45TPFyIwfGzP_UhefBN6TAm7SFBNNTNDy2fa-emdEqKzD7sr_75XN7QvsrzIU6A55S_5pTMkNe0dBe20QwKsVPeFGq0F1w-HiS6PI7O6eWEUkxjZYsBZApeDjQhPohpFKH8z52Y6Aw1A0OU9UutA1vfiLRAQB4Ic4k-8tln-nL4Ksk0SHzSuQ79dC_raYWL7a9ES1bSasqiIJ_Votr2-5gVFddh_SXzp4tvb7mCnK1sUn8vKMjvremgwiHKlXv-vwHNLE9aRIkO_Hg4AVPIQYaLrLXwA", "payload": "" } 2024-11-22 07:24:33,070:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433385871837 HTTP/1.1" 200 828 2024-11-22 07:24:33,071:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:24:33 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gtp33icHoj_fOFcevYdRE09k-NwficDhhzSEAkWojFYleUF8ihU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:30:42Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385871837/lzGNtw", "status": "pending", "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385871837/08KxfQ", "status": "pending", "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385871837/UndPAg", "status": "pending", "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg" } ] } 2024-11-22 07:24:33,071:DEBUG:acme.client:Storing nonce: gtp33icHoj_fOFcevYdRE09k-NwficDhhzSEAkWojFYleUF8ihU 2024-11-22 07:24:33,072:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:24:33,072:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-11-22 07:24:33,084:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:24:33,084:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:24:33,087:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:24:33,087:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:24:33,088:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:24:33,088:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:24:33,093:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:24:33,136:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 07:24:33,335:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:24:33,337:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 07:24:33,337:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 07:24:33,342:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:27 UTC. 2024-11-22 07:24:33,342:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:24:33,342:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:24:33,348:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:24:33,348:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:24:33,348:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:24:33,364:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:24:33,365:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:24:33,367:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:24:33,844:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:24:33,845:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:24:33 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7n0EuLh4xow": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:24:33,845:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:24:39,616:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8754_key-certbot.pem 2024-11-22 07:24:45,312:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8752_csr-certbot.pem 2024-11-22 07:24:45,313:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:24:45,313:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:24:45,472:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:24:45,473:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:24:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgT7gqLdAm2Nc_EbO8d74U18NFAhbbqKOwhiaVX-AWeDEc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:24:45,473:DEBUG:acme.client:Storing nonce: eYk8fkgT7gqLdAm2Nc_EbO8d74U18NFAhbbqKOwhiaVX-AWeDEc 2024-11-22 07:24:45,474:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:24:45,479:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1Q3Z3FMZEFtMk5jX0ViTzhkNzRVMThORkFoYmJxS093aGlhVlgtQVdlREVjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jq3kI-cJQFrWfCzNguiuntjwtV27oxWqTVS9T5-yvg-ApNtE_j2F9ji0B6_hyI4YOh0VSCXJTw3cE7nFqE1BXmvJ3rw4Q8NhSPIsaFHDhA4ppu90dlvZYH0kAKCwwtzkd3cwWYJBQClf5lSB-yb0JkuinsabZ8Y-IbkzDaxEYXW9iBmXw_aQWpl1kNuD9RY0W_f9HkRSkJkFxGd_WYdAkztrDYhniakXGpGkw8xff-9dERgVzi4_EEGlGDYjq5QbgvoTLVWep5LtTvCi2qwFmyd-IVteNIuqVsrp_hZEhh7yj22YAdlwCF6vVctRepbVZ5xYWqmHxj98AsDVUsl8_w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-22 07:24:45,680:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-22 07:24:45,680:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:24:45 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335212297 Replay-Nonce: eYk8fkgTdJYpu4laMLBNIL_7h7QVAv6jSAbHVCLZtManEdzZshs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:30:55Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385936637" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335212297" } 2024-11-22 07:24:45,681:DEBUG:acme.client:Storing nonce: eYk8fkgTdJYpu4laMLBNIL_7h7QVAv6jSAbHVCLZtManEdzZshs 2024-11-22 07:24:45,681:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:24:45,687:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433385936637: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RkSllwdTRsYU1MQk5JTF83aDdRVkF2NmpTQWJIVkNMWnRNYW5FZHpac2hzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODU5MzY2MzcifQ", "signature": "LRBiXj8Le1dL6owO4nnqWf1mrzfh-Ve1hy-1jB692XNm4RgNO52bEhYNo4pTyDxDSG_7bCZ4Kh220DgMm0sVv2F2vlLO-YBs1lOBuh9MmxDKHfSBI2RJF8Y34Nflg7mqTZly619npohl4zGQ32ksUww-q8j0xeqUicsq-UigEZdNqR4-uF2jDXu_gj2eJGPNIfVohGZKuRBfwCXLoXWkr-weLIHrADnlH2yczscwZDWhWGo_zr4Ayi1cGBwsfuHWHFYqdDNjDgPf7jGQCZ4CkOTODWEcV7fr1b036ZmhChA7KJQxGDg4e8jvyjPAL0t0bfEURHTWo0EB_wgjt8AtEQ", "payload": "" } 2024-11-22 07:24:45,851:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433385936637 HTTP/1.1" 200 822 2024-11-22 07:24:45,852:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:24:45 GMT Content-Type: application/json Content-Length: 822 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FVNV6H0MOi-NtB6tdPUnaao96o6vnFD8b0JLNfnJk2YI8knqa4g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:30:55Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385936637/UMKluQ", "status": "pending", "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385936637/bnCyvA", "status": "pending", "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433385936637/Q-td3A", "status": "pending", "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I" } ] } 2024-11-22 07:24:45,852:DEBUG:acme.client:Storing nonce: FVNV6H0MOi-NtB6tdPUnaao96o6vnFD8b0JLNfnJk2YI8knqa4g 2024-11-22 07:24:45,853:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:24:45,853:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-11-22 07:24:45,854:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:24:45,854:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:24:45,855:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:24:45,855:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:24:45,855:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:24:45,855:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:24:45,856:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:24:45,911:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 07:24:46,201:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:24:46,202:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-22 07:24:46,202:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-22 07:24:46,207:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:47 UTC. 2024-11-22 07:24:46,208:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:24:46,208:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:24:46,213:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:24:46,214:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:24:46,214:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:24:46,230:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:24:46,231:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:24:46,232:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:24:46,667:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:24:46,668:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:24:46 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_eAE6RAGMGk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:24:46,668:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:24:52,446:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8755_key-certbot.pem 2024-11-22 07:24:57,982:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8753_csr-certbot.pem 2024-11-22 07:24:57,983:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:24:57,983:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:24:58,127:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:24:58,128:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:24:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gtp33icHymqSQ6vDO7US7wbBXfA9tOrfTjwLn4htesZo4wtOkF8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:24:58,128:DEBUG:acme.client:Storing nonce: gtp33icHymqSQ6vDO7US7wbBXfA9tOrfTjwLn4htesZo4wtOkF8 2024-11-22 07:24:58,128:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:24:58,134:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0h5bXFTUTZ2RE83VVM3d2JCWGZBOXRPcmZUandMbjRodGVzWm80d3RPa0Y4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "kB-PzI2LJJ09hmrMi9RrtRaTDnDER1cSd-s1plRGggHhMqmTcqN60kVKpiEMokkPOtgTAyzDusDib6ZHbc-3oVUmCPITiXJBwbeWIXDX7nIVicanfPBjEPK4kyDmg06wqQcQ_UMEwph1zInRryfn5Mx6idlSjqQFyGGip_RnVQw6pTJl8hIdwGLWK-i9_NGVaY924V1AftwfWpbZT5kS3DR7nsJNe3oLdUlI0V8xlILxZ9HVnvXDPuuislkxI9TcQZdvZXgn4HvahNo3We_rROFJ_zUNx9qC8Qst1-VHusVvq4IZcf28hOWMBRn7R6WCeQb9kORsX43T5zyVaCaeVA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-22 07:24:58,367:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2024-11-22 07:24:58,368:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:24:58 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335268447 Replay-Nonce: zIaIDaiTNaeVUdvpsfzonKs1gmEe98SRGocg8rZoex1a38TQI7k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:08Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386017137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335268447" } 2024-11-22 07:24:58,368:DEBUG:acme.client:Storing nonce: zIaIDaiTNaeVUdvpsfzonKs1gmEe98SRGocg8rZoex1a38TQI7k 2024-11-22 07:24:58,368:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:24:58,375:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386017137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVROYWVWVWR2cHNmem9uS3MxZ21FZTk4U1JHb2NnOHJab2V4MWEzOFRRSTdrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYwMTcxMzcifQ", "signature": "vLKKLdBVEHEzoSw2dDov1WtrR7mUjhq6JRTxZO28UrCiqYTMO9Kj3N5e-9Led_CSVanCnYpc2ehDpiYX9e9A06uhut9otqnYIaA-CZ9IELVm612SpopQ5n16lJJUeOklfh9j-xvbKRHbGEiic_h2D2afifzFVOX0Ge7PSUTl9Epu2u09UbVM1Eahch07VQsERakEPJx5vX7O35nnXzm67vcx9OlvpmVJq42BMeNlFbQFfjDo5gKBhRP1nd9lPmMfPR2eddtF9xLKQkUU4CRuIb4C3Pv-Ie480sEGZLbnyGZ72_cAA0oojlLdt-0o-rPzF2AACtN53xXePNMCGNXTVg", "payload": "" } 2024-11-22 07:24:58,524:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386017137 HTTP/1.1" 200 825 2024-11-22 07:24:58,525:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:24:58 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gtp33icHJgLS-hBNYGYjdVBErUzcXwMD2LLtjtLoZQovUQyYerk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:08Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386017137/5ns8sQ", "status": "pending", "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386017137/Q2i4ow", "status": "pending", "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386017137/4FswZw", "status": "pending", "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY" } ] } 2024-11-22 07:24:58,526:DEBUG:acme.client:Storing nonce: gtp33icHJgLS-hBNYGYjdVBErUzcXwMD2LLtjtLoZQovUQyYerk 2024-11-22 07:24:58,526:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:24:58,527:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-11-22 07:24:58,527:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:24:58,527:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:24:58,528:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:24:58,528:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:24:58,528:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:24:58,529:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:24:58,530:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:24:58,582:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 07:24:58,779:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:24:58,780:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-11-22 07:24:58,781:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-11-22 07:24:58,785:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-11-22 07:24:58,789:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:24:58,832:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 07:24:59,057:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:24:59,058:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 07:24:59,059:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 07:24:59,064:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:08 UTC. 2024-11-22 07:24:59,065:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:24:59,065:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:24:59,070:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:24:59,071:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:24:59,071:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:24:59,075:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:24:59,076:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:24:59,078:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:24:59,523:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:24:59,523:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:24:59 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Z9jEFQo11ps": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:24:59,524:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:25:05,319:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8756_key-certbot.pem 2024-11-22 07:25:10,931:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8754_csr-certbot.pem 2024-11-22 07:25:10,931:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:25:10,931:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:25:11,080:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:25:11,080:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:25:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTf98JmHSSFdIS3x9aHMbuvjqPGj7zkQGQqGs55-r7YVY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:25:11,081:DEBUG:acme.client:Storing nonce: zIaIDaiTf98JmHSSFdIS3x9aHMbuvjqPGj7zkQGQqGs55-r7YVY 2024-11-22 07:25:11,081:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:25:11,088:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRmOThKbUhTU0ZkSVMzeDlhSE1idXZqcVBHajd6a1FHUXFHczU1LXI3WVZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xYX4CS3lHdEyEsdzF-xPoy5JjruJTMX5Lo5eToCSdXNBVL_QFqyjN7278PvVO7xMCjQ-xpWHHupA45pPdRBLqb0PUCej0cNfdQNXqdg5CE-mYSxjIaH1mkJeA13XSrIBWDYdwnxi18AA4e0ter7V8JC9BQ6hLQI39BIog6gmBGx5txkRzVrAq2cAEaK7KMBMsq5vfPmt_t4Z0otwdGkEl3yeX6ubVCDTXIqpZnPjRWIdy_aX22rClBUazFKiaD_n3NxpbADVXbYs-rJP-Ob2-cLTitXxDIP-ZGGNbJhIZldKyM2G-NnZsB6bOwZPH_byCKBJs8a10VZb7Znzsd0Rgw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-22 07:25:11,274:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-22 07:25:11,274:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:25:11 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335319597 Replay-Nonce: zIaIDaiTgP_PLYwgl9XVzjs-qp9_Tx-Yb8Nnj9RRRnycObDp7yA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:21Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386094387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335319597" } 2024-11-22 07:25:11,275:DEBUG:acme.client:Storing nonce: zIaIDaiTgP_PLYwgl9XVzjs-qp9_Tx-Yb8Nnj9RRRnycObDp7yA 2024-11-22 07:25:11,275:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:25:11,282:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386094387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRnUF9QTFl3Z2w5WFZ6anMtcXA5X1R4LVliOE5uajlSUlJueWNPYkRwN3lBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYwOTQzODcifQ", "signature": "oe2u3IU-4maGb2izZWxVtPpRb2_SSVnPMpLBqPO-4LC7ZxcHUL4OJ9GEOqSxCcgq817hLE4TdA0clbIKdN7W-xP2H5h9-TwlpXWO_Fz9sQCMEQtYP7pf0Rhl5D05AjZUqkHPWz5WP4OoKl6fK6-imRpDYGJXze2vOVNDN_03fvzeTQchLpt_3AlYwUCDUxPL-6yhUxZfJpjJSFK07JizV2ntlHkx5q_EqxOHDmJd_s8Lu3Xr7X0MQhyX0xivXwPxnDsmtDose-8N6dFjU8RyVvjg_eR1PrVgkPjJC6IG12jy_msCGDHQ_fBEjbFbaJGD07NaqeMxj0fT9_kJqRBhZw", "payload": "" } 2024-11-22 07:25:11,438:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386094387 HTTP/1.1" 200 819 2024-11-22 07:25:11,439:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:25:11 GMT Content-Type: application/json Content-Length: 819 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gtp33icHU34buEyIBzDHDYGaHv_U6BfZ3zy_L-NhAaM3J96S-cw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:21Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/GfKRvQ", "status": "pending", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/C_-m4Q", "status": "pending", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386094387/-o13Yw", "status": "pending", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE" } ] } 2024-11-22 07:25:11,439:DEBUG:acme.client:Storing nonce: gtp33icHU34buEyIBzDHDYGaHv_U6BfZ3zy_L-NhAaM3J96S-cw 2024-11-22 07:25:11,440:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:25:11,440:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-11-22 07:25:11,441:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:25:11,441:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:25:11,442:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:25:11,442:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:25:11,442:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:25:11,443:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:25:11,444:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:25:11,494:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 07:25:11,742:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:25:11,743:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 07:25:11,744:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 07:25:11,749:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:27 UTC. 2024-11-22 07:25:11,749:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:25:11,749:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:25:11,754:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:25:11,755:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:25:11,755:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:25:11,771:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:25:11,772:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:25:11,774:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:25:12,222:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:25:12,223:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:25:12 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "bFUYyBrPnIU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:25:12,223:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:25:17,907:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8757_key-certbot.pem 2024-11-22 07:25:23,456:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8755_csr-certbot.pem 2024-11-22 07:25:23,456:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:25:23,456:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:25:23,605:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:25:23,605:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:25:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiT5t6Rj6a6AcKPhD8EiOPt7tRGINVlBPC909HxBfBy6Js X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:25:23,606:DEBUG:acme.client:Storing nonce: zIaIDaiT5t6Rj6a6AcKPhD8EiOPt7tRGINVlBPC909HxBfBy6Js 2024-11-22 07:25:23,606:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:25:23,612:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVQ1dDZSajZhNkFjS1BoRDhFaU9QdDd0UkdJTlZsQlBDOTA5SHhCZkJ5NkpzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sRfNoOjAukpHB5NfUN7PfaE2Emt9Cf5X_iKTVb5h1fZgu0-dLJgPPDfFveLhJNvX6PuZFsjCPhvhBZ7N3CiXQ9Mgh9Z6bqEAwbJ6jd6ZkZA1zfAjAqjTZzvCvvzZEtQpzw06w3aY2a67L8MWl_R2NZmXy4Bw8WObZ0UxVzhnT-hGSuf6aA4tkdZLmebtmwA69zbS1lfjSJ06DYOigljQ1-7EpkGIA_zDVNtr0zyg1Xk0nrcTAAH_BOeztbSvJqlPi6hwBo5RaYZhKJrfDNlHCpajqzlOCDeRfFMVgds2svgI1ys1JJsGao436Rb1bciEsorAyu2QfVTPTIq1CS7pjg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-22 07:25:23,798:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-22 07:25:23,799:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:25:23 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335362247 Replay-Nonce: gtp33icHy8NmHd_Fo8YDHhTI2kNK4cvNT0jMQ1HLFpmyoXYQ-kw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:34Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386161497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335362247" } 2024-11-22 07:25:23,799:DEBUG:acme.client:Storing nonce: gtp33icHy8NmHd_Fo8YDHhTI2kNK4cvNT0jMQ1HLFpmyoXYQ-kw 2024-11-22 07:25:23,800:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:25:23,805:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386161497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0h5OE5tSGRfRm84WURIaFRJMmtOSzRjdk5UMGpNUTFITEZwbXlvWFlRLWt3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYxNjE0OTcifQ", "signature": "pXDX3ZVSSH-S5Tct9aNHQp06X-Uj_sQo4SB-yaTJIKMPCadAtXVXIycKUnjFSh1jftgjTqaR1AcJNeXZjLFujXDnGdQJ2bC6uE4GBGdZ0l_1OE9zbEXPcl4qBbiEKg8Eu2x8Cki9A3tnQEeSZGBEssof16qTxiE_WxuVlzBr9NwFjhW6r7CSSXlqC6YT9o6FACLDWRffOjJ__Ke3txu-WYCfcG2RMznwIyA9drMDWRMaqvIYBR-gcVcCz9iMcf_gnssmcRFQfZ4yp4fnNaGl64jvilmPr9FSaY6An8mfvHWgeznhocQP_HdcoTqgqVskU0ogLQ5wA2oG3oi4M5_Ucg", "payload": "" } 2024-11-22 07:25:23,974:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386161497 HTTP/1.1" 200 823 2024-11-22 07:25:23,975:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:25:24 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTPWPWaJkAEthS9B82_rOTbkRQQFl3J1VsnTDiCDrV5wE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:34Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386161497/SgjmHQ", "status": "pending", "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386161497/DvhIEA", "status": "pending", "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386161497/G65eQA", "status": "pending", "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI" } ] } 2024-11-22 07:25:23,975:DEBUG:acme.client:Storing nonce: zIaIDaiTPWPWaJkAEthS9B82_rOTbkRQQFl3J1VsnTDiCDrV5wE 2024-11-22 07:25:23,975:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:25:23,976:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-11-22 07:25:23,977:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:25:23,977:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:25:23,978:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:25:23,978:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:25:23,978:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:25:23,978:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:25:23,979:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:25:24,030:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 07:25:24,221:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:25:24,222:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-22 07:25:24,223:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-22 07:25:24,227:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:58 UTC. 2024-11-22 07:25:24,228:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:25:24,228:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:25:24,232:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:25:24,233:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:25:24,233:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:25:24,249:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:25:24,250:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:25:24,252:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:25:24,687:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:25:24,688:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:25:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "2lmrZBfvVZs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:25:24,688:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:25:30,380:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8758_key-certbot.pem 2024-11-22 07:25:35,956:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8756_csr-certbot.pem 2024-11-22 07:25:35,956:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:25:35,956:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:25:36,101:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:25:36,102:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:25:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTqodt135hKtsmWa1F85L1ZOyXQkZyzQAuRqEAzapx-bg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:25:36,102:DEBUG:acme.client:Storing nonce: zIaIDaiTqodt135hKtsmWa1F85L1ZOyXQkZyzQAuRqEAzapx-bg 2024-11-22 07:25:36,102:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:25:36,109:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRxb2R0MTM1aEt0c21XYTFGODVMMVpPeVhRa1p5elFBdVJxRUF6YXB4LWJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qkcsr7vWUXgX_KkoKzzSO2wVel8v2YyF2BIH09v2s6sIVymwDVchzP1vm_j4i3JTnICFjcruNeKdKZM2bj3VBVCw1SBn2D60BqoMvKhVGiG3IeTxbBPRamfGItmqGCIFGMltm8CF4yVPNCh5t2WTuOtEqlXnpM0RBUjICfnF1MMLLJq5ldG-JeiSJc2k1VW44NmPVBB-Zpt2uID-D8_k3GqR6KzlTtFRy_dVCld-ZA1dSVBGnDK-HzablP3bHqBW7m2RPHbxbMNtlEWT8gEeFsDDOLzXqJkGQUZnRnEOFDHs1OA-ECDp4L21xNBqye8lBvkzYR3ZM_7MHnKJg1LkTQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-22 07:25:36,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2024-11-22 07:25:36,286:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:25:36 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335405237 Replay-Nonce: zIaIDaiThTn0auW0O1So-r67K8S3ncSON56KghuXbV8V5DArIqg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:47Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386225357" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335405237" } 2024-11-22 07:25:36,286:DEBUG:acme.client:Storing nonce: zIaIDaiThTn0auW0O1So-r67K8S3ncSON56KghuXbV8V5DArIqg 2024-11-22 07:25:36,287:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:25:36,293:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386225357: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVRoVG4wYXVXME8xU28tcjY3SzhTM25jU09ONTZLZ2h1WGJWOFY1REFySXFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYyMjUzNTcifQ", "signature": "WOtODqSlHLl_47OFJiZQGAIlAKWhca2w6D-LcIWwt5f23KNsqYPkqKjsRAee_ttW1AKHP1Tqyazc8qvv6KX_NLpJVNuVtYKZej4vvRWP8Q2ZcHUHcXUTZ5zlg6cDN3he5jtu9tZ15WErlUwzsouvwza81QeuQ9o_rDNe_ZENtQvt309_Pt9HyxEwyGv2VGrPezeVzDGHbFz4IMDsNAamdLpbXh_GgdaONUC_zFZt1p2TDE1g0A5f4cJioe9UV69RweY1l9zicoIor5P69TiqbLAKQXxZnP35VIRJCIPREWWaute1TfMXJ6Bzfu5sYdARBwAXwkTB5ANRHr3qD6oiOQ", "payload": "" } 2024-11-22 07:25:36,446:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386225357 HTTP/1.1" 200 827 2024-11-22 07:25:36,447:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:25:36 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gtp33icHWgyeLYhXoT_URc_HFEeE6veIDZGsWWzHQp-o8_W83rw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:47Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386225357/ZOgoCA", "status": "pending", "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386225357/rcFeQQ", "status": "pending", "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386225357/bpWWxw", "status": "pending", "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU" } ] } 2024-11-22 07:25:36,447:DEBUG:acme.client:Storing nonce: gtp33icHWgyeLYhXoT_URc_HFEeE6veIDZGsWWzHQp-o8_W83rw 2024-11-22 07:25:36,449:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:25:36,450:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-11-22 07:25:36,450:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:25:36,451:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:25:36,451:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:25:36,452:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:25:36,452:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:25:36,452:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:25:36,453:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:25:36,502:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 07:25:36,723:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:25:36,725:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2024-11-22 07:25:36,726:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2024-11-22 07:25:36,729:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:15 UTC. 2024-11-22 07:25:36,729:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:25:36,729:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:25:36,735:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:25:36,735:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:25:36,735:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:25:36,740:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:25:36,741:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:25:36,743:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:25:37,186:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:25:37,187:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:25:37 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4-ei26nTmkw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:25:37,188:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:25:42,739:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8759_key-certbot.pem 2024-11-22 07:25:48,405:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8757_csr-certbot.pem 2024-11-22 07:25:48,406:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:25:48,406:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:25:48,555:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:25:48,556:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:25:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gtp33icHvi5HJV0Pa3W-hnU537O3_A2pZJQde8iRjL0XMgJKfHQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:25:48,556:DEBUG:acme.client:Storing nonce: gtp33icHvi5HJV0Pa3W-hnU537O3_A2pZJQde8iRjL0XMgJKfHQ 2024-11-22 07:25:48,556:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:25:48,563:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0h2aTVISlYwUGEzVy1oblU1MzdPM19BMnBaSlFkZThpUmpMMFhNZ0pLZkhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "x6jVy371jNdY6MpR8q2tvpRhB_yG4vvmiKDsA9k6WLyBtvgsj32PM61z5VI3o4n84mNeP_2bw4ACS92B0la36RT_Yvv2S5xFJcsMIAR4yQXfRUaNfeRRviaeRLDca9UsoK6VRk6ZOoPeasNq8tNhsCjNl79GsgqsjEzmWjg0ayQ-Tuyr-WaGmjTHE91NQ5FkfXu4kazv_jLuO12FN0Bk4OnEnEROZxHE8zgdmejuNQrauMbGMbCxsNaWMx4MyXlP8AIlznWp6uzSktAEFtLE2ebwdommhvnR2g0MCnWewBcvahPyDSFzP-Y4_zxTB0p5R6B3QXzWwErdHaWfSiKtRw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-22 07:25:48,740:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2024-11-22 07:25:48,740:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:25:48 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335446687 Replay-Nonce: zIaIDaiTz_z7WgnXOHKi5dJEAZWl1GevA-I_jgbODNQwra2mtR0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:59Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386288977" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335446687" } 2024-11-22 07:25:48,740:DEBUG:acme.client:Storing nonce: zIaIDaiTz_z7WgnXOHKi5dJEAZWl1GevA-I_jgbODNQwra2mtR0 2024-11-22 07:25:48,741:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:25:48,747:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386288977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVR6X3o3V2duWE9IS2k1ZEpFQVpXbDFHZXZBLUlfamdiT0ROUXdyYTJtdFIwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYyODg5NzcifQ", "signature": "yAmBQa5SknptUFzBFxY9AyrfmwFC-YyVIUD2L4KDkwwJRDxDfl-ePyt2ShXRgOUa7tIVJnYCx3wBDbPLSsCOGNCFKVCszozlmbSTuseT6ZdUq2DwOFe9Z4VFEG14JmbLf9BwFeOXKOE-2KKFfiJgYj0dJ03NiHoaBd-ktcf02RgF0Iy7YrW7h6xY-_oHykUZosop3ya5LHCqCr9Mclhzv2l8iNgwG14PDc1Gi_P9Zx5qr1h3m9NWKSi2Jaj_Kk2ZtepeL_FEDm2W_g1mOtJqFok8S5znKuvvP_06OGueFd8-HPPUgXICG-yhFvZ1fvcxjrMrG1-OW7X7rl4B1UGY4g", "payload": "" } 2024-11-22 07:25:48,900:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386288977 HTTP/1.1" 200 825 2024-11-22 07:25:48,900:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:25:49 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiThQsiVBDUHcpEk4iyKejZQ2q3nU5UnVQSlCcKdeOJI00 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386288977/jzYzOg", "status": "pending", "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386288977/qrrE6g", "status": "pending", "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386288977/74HdZw", "status": "pending", "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE" } ] } 2024-11-22 07:25:48,901:DEBUG:acme.client:Storing nonce: zIaIDaiThQsiVBDUHcpEk4iyKejZQ2q3nU5UnVQSlCcKdeOJI00 2024-11-22 07:25:48,903:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:25:48,903:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-11-22 07:25:48,904:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:25:48,904:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:25:48,905:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:25:48,905:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:25:48,905:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:25:48,906:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:25:48,907:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:25:48,958:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 07:25:49,169:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:25:49,170:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 07:25:49,171:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 07:25:49,176:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:37 UTC. 2024-11-22 07:25:49,176:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:25:49,176:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:25:49,182:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:25:49,182:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:25:49,182:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:25:49,198:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:25:49,199:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:25:49,201:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:25:49,683:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:25:49,684:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:25:49 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "E5R5MMNwWrE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:25:49,684:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:25:55,443:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8760_key-certbot.pem 2024-11-22 07:26:01,041:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8758_csr-certbot.pem 2024-11-22 07:26:01,042:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:26:01,042:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:26:01,203:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:26:01,203:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FVNV6H0MbhJL6-Osu_LWe1QJtbm5p0-TV2WfWH2ddZJLudCm3i4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:26:01,203:DEBUG:acme.client:Storing nonce: FVNV6H0MbhJL6-Osu_LWe1QJtbm5p0-TV2WfWH2ddZJLudCm3i4 2024-11-22 07:26:01,204:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:26:01,210:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1iaEpMNi1Pc3VfTFdlMVFKdGJtNXAwLVRWMldmV0gyZGRaSkx1ZENtM2k0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xxkPT-jc81ju08syQVfjtleJamfDocx7Gd66BnrcywZalzP6fZZffgw5X1VnT5nRsS2Le5MzOY0EE9IYbMyzZbRC9-qwcY9sm5K6c3qEVwRaKju73i14yB2be-dwSBTfJGFsV2QMNrC4V7ihjEKeRW7UueirfbbQP9oPq7P8yyRINUCUye4xwDuqSp7BZ8d5vOQn7ZlXZOyoNsC9XI6Yu3SGAs2ldjeqNH10rxZL61D3rR1WwjLoj56tldhYw1RxuUbqp1ul89zjMRfmxANYMucdnhJ8mT2WSMDubsCEUIqtDoWJ8HYKG8IJKPiaGgEg6sbnUSkiy4_D1Zzp0vAjyw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-22 07:26:01,391:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2024-11-22 07:26:01,392:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:26:01 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335505847 Replay-Nonce: eYk8fkgT3_y9wR-THjC0MxFphfQ99TEGIdNF91xk3gcmrG_WBqQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:12Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386373457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335505847" } 2024-11-22 07:26:01,392:DEBUG:acme.client:Storing nonce: eYk8fkgT3_y9wR-THjC0MxFphfQ99TEGIdNF91xk3gcmrG_WBqQ 2024-11-22 07:26:01,392:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:26:01,397:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386373457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1QzX3k5d1ItVEhqQzBNeEZwaGZROTlURUdJZE5GOTF4azNnY21yR19XQnFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODYzNzM0NTcifQ", "signature": "i8bSUTCROEGl88Okr6WuPdV7PHWRSTv5zE5Wcaroygcx_0H1sp82CoENBldNNqw0D-VugNHwZG1neqPsh0eC43OOfzKr5KFCJELjWECD8P03NO6YfZQ-UernlSgA4b2czSPe-bSiWGGOGUxQYclcGUgGdKJbPgbG9PwiN3S_nZ7OY3f3GacQXmFvEes2OrFDAD4PbsWJVyGv71zDminBg8UFI-oODu68r-HB5HT292kGRDx1YDqlcbFPKz63DWUPTAqXnLQYNMx92ao5Hx08SPZBdiLhcYyBTmgA6BH7sgOwQTYITgjENz77j47rHoowN-VVNJ6BKIeYHBfNUfq8vQ", "payload": "" } 2024-11-22 07:26:01,564:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386373457 HTTP/1.1" 200 824 2024-11-22 07:26:01,565:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:01 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FVNV6H0MZcEVAOmgeEwmh64EFfHJ2gAZ1GwbHO4O_adOJw3j3wc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:12Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386373457/JJFsqQ", "status": "pending", "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386373457/CBmaOg", "status": "pending", "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386373457/d3Fmcw", "status": "pending", "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI" } ] } 2024-11-22 07:26:01,565:DEBUG:acme.client:Storing nonce: FVNV6H0MZcEVAOmgeEwmh64EFfHJ2gAZ1GwbHO4O_adOJw3j3wc 2024-11-22 07:26:01,567:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:26:01,568:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-11-22 07:26:01,568:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:26:01,568:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:26:01,569:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:26:01,569:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:26:01,569:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:26:01,570:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:26:01,571:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:26:01,609:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-11-22 07:26:01,609:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:26:01,610:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-11-22 07:26:01,616:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-11-22 07:26:01,619:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-11-22 07:26:01,619:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-11-22 07:26:01,619:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-22 07:26:01,620:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-11-22 07:26:01,622:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-22 07:26:01,664:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 07:26:01,987:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:26:01,988:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 07:26:01,989:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 07:26:01,993:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:56 UTC. 2024-11-22 07:26:01,993:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:26:01,993:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:26:01,999:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:26:02,000:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:26:02,000:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:26:02,005:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:26:02,006:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:26:02,008:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:26:02,445:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:26:02,446:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:02 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_8p5k2Zn4NU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:26:02,446:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:26:08,317:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8761_key-certbot.pem 2024-11-22 07:26:13,967:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8759_csr-certbot.pem 2024-11-22 07:26:13,968:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:26:13,968:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:26:14,114:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:26:14,114:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiT0PDngBprWcD3YhKCn_438uO6pCT1Nx2AcOphsxEFxCQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:26:14,114:DEBUG:acme.client:Storing nonce: zIaIDaiT0PDngBprWcD3YhKCn_438uO6pCT1Nx2AcOphsxEFxCQ 2024-11-22 07:26:14,115:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:26:14,121:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVQwUERuZ0JwcldjRDNZaEtDbl80Mzh1TzZwQ1QxTngyQWNPcGhzeEVGeENRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "p6I_VOuSEs1upPljLnAQxDc9A9k9vqsLRxmBQzhnROYp2X7z559OMOI3jEWOJwNaJ2lk4uNEm8qIgB4qV-r3jzIwPaG16mR9Y4sBYctIbRvXysCC3dDxeLUCpA2qAM1LYU2vopLKhEu7SPu9uW2l4ZxuGl_n9tkH7tdW6xr45N8vC7tDA_r9xxYX06poTRJSGMxlr6hWJPj87RHYPg7RQd0RyTVLawntqaqWUdKa5xAhSjBaNJ1Fxq4XySKgDeycSzKzJRM5edF0fjcNT_HR3_w_NxCuv-UakiE19kl_38RjI-wdEkRZmGOzqkyBeeW7LNH82y-vla7O5htzoouZkQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-22 07:26:14,301:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2024-11-22 07:26:14,302:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:26:14 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335553997 Replay-Nonce: zIaIDaiT8WBDj2dkj8pl4G0tSJBUmMqbclbWmbHGkmyVSHIhLuw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:24Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386447927" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335553997" } 2024-11-22 07:26:14,302:DEBUG:acme.client:Storing nonce: zIaIDaiT8WBDj2dkj8pl4G0tSJBUmMqbclbWmbHGkmyVSHIhLuw 2024-11-22 07:26:14,303:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:26:14,309:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386447927: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVQ4V0JEajJka2o4cGw0RzB0U0pCVW1NcWJjbGJXbWJIR2tteVZTSEloTHV3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY0NDc5MjcifQ", "signature": "lQr5QGOXjYwLEglZpQsoxLzJKQj1qEgaf0p4trlbAhudoHFF0o7KISqGVn9qCkUeXvjQ2hujqsXe3emjNoMO1RDqEEwXLFgC355OGprAPq-4y1rltRZzMdypIuYJwSO3YzL2szdc1rfI0zkBJt7c9Pl0SQC7Ptl3BaKVcEfSXeNYwO2DRh7gZI1NGQcfXyPbAKJG25v48JQawc_u6CKSdTNsVifScO5f5_KijNDLfAszswjwJxzADPm8SeL9r_lRc2bhucWCwAuj5xDc6dPoSSe9qaG1rm_mIOefKHhSXaVlneaVgzlJFXqL25CsMqSDY1JOWlojUuRQvj1l_b2fXw", "payload": "" } 2024-11-22 07:26:14,462:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386447927 HTTP/1.1" 200 829 2024-11-22 07:26:14,462:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:14 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTq1p8JA2oaB2fGf3NZR0QgcBD1T1B0t2k9c0MQ_zepeg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:24Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386447927/eNwFHQ", "status": "pending", "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386447927/lliEPw", "status": "pending", "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386447927/PLs0Mg", "status": "pending", "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY" } ] } 2024-11-22 07:26:14,463:DEBUG:acme.client:Storing nonce: zIaIDaiTq1p8JA2oaB2fGf3NZR0QgcBD1T1B0t2k9c0MQ_zepeg 2024-11-22 07:26:14,463:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:26:14,464:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-11-22 07:26:14,464:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:26:14,465:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:26:14,465:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:26:14,466:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:26:14,466:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:26:14,466:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:26:14,467:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:26:14,518:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 07:26:14,709:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:26:14,710:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 07:26:14,711:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 07:26:14,716:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:15 UTC. 2024-11-22 07:26:14,717:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:26:14,717:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:26:14,722:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:26:14,722:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:26:14,722:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:26:14,727:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:26:14,728:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:26:14,731:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:26:15,209:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:26:15,209:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:15 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "SUlSuZQIlso": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:26:15,210:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:26:21,318:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8762_key-certbot.pem 2024-11-22 07:26:26,884:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8760_csr-certbot.pem 2024-11-22 07:26:26,885:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:26:26,885:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:26:27,045:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:26:27,046:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgTpToskCiD0siz7FjP5Q4zocQxWuR4vUG0VC3ITuk9p90 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:26:27,046:DEBUG:acme.client:Storing nonce: eYk8fkgTpToskCiD0siz7FjP5Q4zocQxWuR4vUG0VC3ITuk9p90 2024-11-22 07:26:27,046:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:26:27,054:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RwVG9za0NpRDBzaXo3RmpQNVE0em9jUXhXdVI0dlVHMFZDM0lUdWs5cDkwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DMSG9VTlLSyd55OOhv09Lm1FQKquOf3jkJY_rw14hVOFXbAGzBE-9Riy-W8tdFgCY1A-vF9NPm_KO0GxfeZBmTUv5gOLOYdi5zHDEvyHG-el9lrNhPhP32RCPRG4JEVScNuL6oSyywqNRXDr30ASnwJeWxsEf_SBNqjLsdq3V8stBs6_gosXdD4Gm8piyKaeMovdMdZ05EM1yItV1SbL1VUjQiNvtS5kKmPuOJdeAqBdH3Rku_ZRyfmt0D8hiB2qZMjSZe397ZIzXojjNOIxXSXCTsgNiIoBP079jY4eqE4jZxe9-0IWHgP5mTAWl-RzBeulQUcNYOFgu94i9T8Jkw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-22 07:26:27,251:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2024-11-22 07:26:27,251:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:26:27 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335602617 Replay-Nonce: FVNV6H0MYFccK0NTKYouX9MZQYYDQSaqDjd05050szIjflooBYw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:37Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386519187" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335602617" } 2024-11-22 07:26:27,252:DEBUG:acme.client:Storing nonce: FVNV6H0MYFccK0NTKYouX9MZQYYDQSaqDjd05050szIjflooBYw 2024-11-22 07:26:27,252:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:26:27,258:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386519187: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1ZRmNjSzBOVEtZb3VYOU1aUVlZRFFTYXFEamQwNTA1MHN6SWpmbG9vQll3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY1MTkxODcifQ", "signature": "irDFf51Eor9myvSYtie_pV1bvSFWmqhZFgUUVjLxee_bBmNgZqaQPs8xzeO1k15MCSTBEPGvHGcDm01R_6fdcI1VOrEkGRQTlLphCTHmTXP7wxK-ZG5Rf0aoKwvz3JmfHioIJ5jI8s0w-bnO1CPjJOFPW0kKUOFAbFEi6q3l_glyBKXVRXmoEgO3PCigDqM2qxo66JfE4Oho_CHKKmrMZ0o6G_hLqzMdnRLRD7Vt4GNo8zEz-GAg5hE8lSLt4vSZRjRyUqBk7Hs_E0GZeH2onfhTRjE_E48BMXLm18hZ16J_3lwpEOZ0DWzcXjMKjxnXy2tbwdO4BWZfEr7xgsDCYw", "payload": "" } 2024-11-22 07:26:27,434:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386519187 HTTP/1.1" 200 828 2024-11-22 07:26:27,434:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:27 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgTy8EH959BTEpSL339tRFO1fDWqX3ahEWYz7xcFap_wSM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:37Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386519187/-jLYlg", "status": "pending", "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386519187/XHeZAA", "status": "pending", "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386519187/XcgphA", "status": "pending", "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk" } ] } 2024-11-22 07:26:27,435:DEBUG:acme.client:Storing nonce: eYk8fkgTy8EH959BTEpSL339tRFO1fDWqX3ahEWYz7xcFap_wSM 2024-11-22 07:26:27,435:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:26:27,436:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-11-22 07:26:27,436:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:26:27,436:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:26:27,438:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:26:27,438:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:26:27,438:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:26:27,439:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:26:27,440:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:26:27,499:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-22 07:26:27,748:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:26:27,749:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-11-22 07:26:27,750:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-11-22 07:26:27,754:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:32 UTC. 2024-11-22 07:26:27,755:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:26:27,755:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:26:27,761:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:26:27,761:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:26:27,762:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:26:27,766:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:26:27,767:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:26:27,768:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:26:28,215:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:26:28,216:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:28 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6xNEV80F85M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:26:28,216:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:26:33,984:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8763_key-certbot.pem 2024-11-22 07:26:39,565:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8761_csr-certbot.pem 2024-11-22 07:26:39,565:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:26:39,565:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:26:39,714:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:26:39,715:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTDYJ8W3vGl4mjyrU4tY3rh2mCa1whD8S1TiZoxzpaJy8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:26:39,715:DEBUG:acme.client:Storing nonce: zIaIDaiTDYJ8W3vGl4mjyrU4tY3rh2mCa1whD8S1TiZoxzpaJy8 2024-11-22 07:26:39,715:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:26:39,722:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAieklhSURhaVREWUo4VzN2R2w0bWp5clU0dFkzcmgybUNhMXdoRDhTMVRpWm94enBhSnk4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QmUyymkiRngcPm6sx4kNI9zfs2UtssZsKYywG0aPkPoDph68FBwb3Jmr1PRpedyqJ_ZSozwgEd8nnYiJI6G9dVCI4IxvUvq-dZIijBCsUYSnKijtIkCedUCKlIRGzZBeYGC8pRQCZjC9rg45mC5Ni5vTEQ0_6gHbmI9uaySqO6h5JiJKBj7E0_3TWKuJ2JwdxB3okDSUBU58MN1iOQZ-ZG3SxmUyEw83vKfZcAV13v1cRQvJcAbCeYDjOLOPcQjix7DJPoKKa_lwB3P2DuUhLFBovFMDx0iKMowGyweF4_QbxO_3vFcdYCZvs0x9-nzh3myfthT_CgEgBtramo5dCA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-22 07:26:39,915:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2024-11-22 07:26:39,915:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:26:40 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335648247 Replay-Nonce: gtp33icHE4pdaBq_pDvR39yHpuP11agSABq4ocKITot18eI0SEY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:49Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386588377" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335648247" } 2024-11-22 07:26:39,916:DEBUG:acme.client:Storing nonce: gtp33icHE4pdaBq_pDvR39yHpuP11agSABq4ocKITot18eI0SEY 2024-11-22 07:26:39,916:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:26:39,923:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386588377: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ3RwMzNpY0hFNHBkYUJxX3BEdlIzOXlIcHVQMTFhZ1NBQnE0b2NLSVRvdDE4ZUkwU0VZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY1ODgzNzcifQ", "signature": "ijGsc4nRc9hyfpQ4uiOkBr55fg0oGZBxteGuYWc3dmzvQG_k0QdImNyZsD-eqe13QmGvYcyo3UApLMSRIfsToEti0VRDi8WzqgYqmsgNve_lFtG0Wh1xKBhGANKlB_IX-1MNseMeZQJnz7KI45PEjz72E4ltepLH7kDtBfq76QzKEXvJANl9AhiqoPk1EIPcUalBI06JPykjomZcSEb9g9fEtSe86iA5pZe-IHyPoDT6BMVxWNa1a5miAXPf1V87LKPf54JDUmJXekmiE-Wzc60WDNOKjC--XbqhGDbfceme9fTllNUocvsrCRlLwibr5FOXowt8rq0i8X4MCvO52A", "payload": "" } 2024-11-22 07:26:40,077:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386588377 HTTP/1.1" 200 827 2024-11-22 07:26:40,078:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:40 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zIaIDaiTwjcITC2vVm7oVXG1JdRRtuo-1ZfAbpp3gQV3pICmL0M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:49Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386588377/hneKNA", "status": "pending", "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386588377/67ZXmA", "status": "pending", "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386588377/mNBDgA", "status": "pending", "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ" } ] } 2024-11-22 07:26:40,078:DEBUG:acme.client:Storing nonce: zIaIDaiTwjcITC2vVm7oVXG1JdRRtuo-1ZfAbpp3gQV3pICmL0M 2024-11-22 07:26:40,078:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:26:40,079:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-11-22 07:26:40,079:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:26:40,080:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:26:40,080:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:26:40,081:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:26:40,081:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:26:40,081:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:26:40,082:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:26:40,135:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 07:26:40,351:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:26:40,353:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-11-22 07:26:40,353:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-11-22 07:26:40,358:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:52 UTC. 2024-11-22 07:26:40,358:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:26:40,358:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:26:40,364:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:26:40,364:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:26:40,364:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:26:40,369:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:26:40,369:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:26:40,372:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:26:40,849:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:26:40,849:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:40 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Fkg0u43UCck": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:26:40,849:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:26:46,563:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8764_key-certbot.pem 2024-11-22 07:26:52,208:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8762_csr-certbot.pem 2024-11-22 07:26:52,208:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:26:52,208:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:26:52,368:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:26:52,369:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FVNV6H0MgyZZ6u37GmbsMF86u1SZCLb8mt_nP15WOGTHXwqbhDc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:26:52,369:DEBUG:acme.client:Storing nonce: FVNV6H0MgyZZ6u37GmbsMF86u1SZCLb8mt_nP15WOGTHXwqbhDc 2024-11-22 07:26:52,369:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:26:52,375:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1neVpaNnUzN0dtYnNNRjg2dTFTWkNMYjhtdF9uUDE1V09HVEhYd3FiaERjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pIcrdIixTDUfbgOeUkd0JItDAX1nXHCP7zb-6izHTZPSSrpPpqZmsZIj4lMuLQwEyQ-Z3iPWvmrwHSpt_pKEHWq_rsh8n-ngEPMgLPlKUlkYl22uw5pq89dkF-sDGtSIEaWd3bKcOnGE9HkmB3cWmdA21rWSUrGQ_hNjeqvphrW9ub210GD5GBUQGWn7Ob4mgE0DsgPI9hudRGmVydbPK4KtRbz08fUcr6E8Ftj8cpt8FGPYEyzjqtNrfRS_vGQ8Y_umV28DsBpRy3U-fKxlp3D2NyVsa8JW4f-DiCNXYNP45kkKdinDDNy50GuHQxTz9KBFirIiHnktcUZaaRuYFw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-22 07:26:52,623:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-22 07:26:52,624:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:26:52 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335696957 Replay-Nonce: FVNV6H0M6BWfhnbfkRmpk12huu0JzxsikRZty3nZIaY4g5AoFIY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:33:02Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386660297" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335696957" } 2024-11-22 07:26:52,624:DEBUG:acme.client:Storing nonce: FVNV6H0M6BWfhnbfkRmpk12huu0JzxsikRZty3nZIaY4g5AoFIY 2024-11-22 07:26:52,624:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:26:52,630:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386660297: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME02QldmaG5iZmtSbXBrMTJodXUwSnp4c2lrUlp0eTNuWklhWTRnNUFvRklZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY2NjAyOTcifQ", "signature": "uv0JDKGZcpDLyWTEK7wE07Id0KR4yxKau0CCy3tZVstsRZjky8fi4K9Myu7lckPSkoLU_N-_skCUH0T8y9UAa3wItpB_qhnDh9WiHEzF59TLY33-oEk9ZaEqcZgD1B9cFD1_zW5E0oZA3NkBoBU-S1Doi9d325TqqpEahq68IPtePjMSD5Z0uOjWrNhORVffr-VHNMqU8Q1yWoNRtoBbZQGZjW9u78IKiMkKZXTPMpFv4SzmSHfUAqn_L7mA88mxjfciXnYC_5lmbKdaFMZXjOVDu6GORRQ_Q7ziE5PqMnTNr6_bEdHoA28L2UUjuTDPO-oEZqyXoc94TmCxseML9A", "payload": "" } 2024-11-22 07:26:52,794:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386660297 HTTP/1.1" 200 823 2024-11-22 07:26:52,795:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:52 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgTJ9DlmSaT36aBSD-YBzYKeSnFCMDwwnvbp07Vw8IBLrU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:33:02Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386660297/Jd3mYQ", "status": "pending", "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386660297/hz_bKw", "status": "pending", "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386660297/9adDwA", "status": "pending", "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM" } ] } 2024-11-22 07:26:52,795:DEBUG:acme.client:Storing nonce: eYk8fkgTJ9DlmSaT36aBSD-YBzYKeSnFCMDwwnvbp07Vw8IBLrU 2024-11-22 07:26:52,795:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:26:52,795:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-11-22 07:26:52,796:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:26:52,796:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:26:52,797:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:26:52,797:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:26:52,797:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:26:52,798:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:26:52,799:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:26:52,851:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 07:26:53,074:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:26:53,076:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-22 07:26:53,076:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-22 07:26:53,080:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:10 UTC. 2024-11-22 07:26:53,081:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:26:53,081:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:26:53,086:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:26:53,086:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:26:53,087:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:26:53,092:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:26:53,093:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:26:53,095:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:26:53,573:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:26:53,574:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:26:53 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "kgcxjo1gE2s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:26:53,574:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:26:59,571:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8765_key-certbot.pem 2024-11-22 07:27:05,096:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8763_csr-certbot.pem 2024-11-22 07:27:05,096:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:27:05,096:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:27:05,255:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:27:05,256:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:27:05 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FVNV6H0MDhyIqezB98a_IlpfKNT_NFZk8Pn-dEAO0SKtyysZhZE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:27:05,256:DEBUG:acme.client:Storing nonce: FVNV6H0MDhyIqezB98a_IlpfKNT_NFZk8Pn-dEAO0SKtyysZhZE 2024-11-22 07:27:05,256:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:27:05,264:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1EaHlJcWV6Qjk4YV9JbHBmS05UX05GWms4UG4tZEVBTzBTS3R5eXNaaFpFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dMUPdjOTt20aHAzhXCTGnn8LzpCuz3BuIRNp_dZeLbCW5hBJ8YSGauI3t43Z5TWH0RCsvopD3vNbc3ERdmb0RNSWbwaUyBRVrEXW51rNZKownGoD1_TN9wfDAVnkmKRUavd0geQDFLrgW49wH5W5sURUVw6fvt2QXXNVNhksxCYrbviBxTypbBirBIHREI4B0ZPgZGHWjjW7xytFeO0aXPB7SQkWCiF3hfPK33nQ7QWbphS_PGiEj14cWgteI10DayzRI7jqcN8EO3jX52n1HTi5XoxotkDS5QoOFDAw54aFynCZYOzcdaziXkTNMwbGFXnCp_uI7VZ83LTr0fDbdg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-22 07:27:05,466:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-22 07:27:05,467:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:27:05 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335757157 Replay-Nonce: FVNV6H0MHmzkw8g3Wb9yQ03JVw9pjC_uf8-SvYr2pverW0G73JA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:33:15Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386749437" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335757157" } 2024-11-22 07:27:05,467:DEBUG:acme.client:Storing nonce: FVNV6H0MHmzkw8g3Wb9yQ03JVw9pjC_uf8-SvYr2pverW0G73JA 2024-11-22 07:27:05,468:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:27:05,473:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386749437: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME1IbXprdzhnM1diOXlRMDNKVnc5cGpDX3VmOC1TdllyMnB2ZXJXMEc3M0pBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY3NDk0MzcifQ", "signature": "Qi_dqat86C7mNcU_cLKaaNmpbteqwlj3WkrTFMzJT18nS2YvaanqnS77b54IA6G5oodVG35PqUKi-ezchvT6ibuPTqLAD9wGrVcRtam008aG4HUbvCAK9gTL75Jb1xEgrNvi3XbPwwS9kLFvpTwHp15WP0ivSdiHrFAFRs2vqE27alNxnreX1JR-MsI1jSQE2duAvVWk2nTK5Bpa7vyoLqL-qXKK9rsoegehR2pfDILGxXH7tICDfmiby3MkyxwsaO3mW_7fvZYUQ7l1g_GCt9qzJJhmJinY4aqz9FCTMZtyVj1rYB8X79NqiLL0WChHRCxxgk1h5CKikwcw1S73LA", "payload": "" } 2024-11-22 07:27:05,637:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386749437 HTTP/1.1" 200 823 2024-11-22 07:27:05,637:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:27:05 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgTar7DoLk5yT7McKUMR-s-LP6vhHVu2r4bd0KdAVWw4fo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:33:15Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386749437/RcBV3Q", "status": "pending", "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386749437/ODSfIw", "status": "pending", "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386749437/hizs-Q", "status": "pending", "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0" } ] } 2024-11-22 07:27:05,638:DEBUG:acme.client:Storing nonce: eYk8fkgTar7DoLk5yT7McKUMR-s-LP6vhHVu2r4bd0KdAVWw4fo 2024-11-22 07:27:05,638:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:27:05,639:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-11-22 07:27:05,639:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:27:05,640:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:27:05,640:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:27:05,641:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:27:05,641:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:27:05,641:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:27:05,642:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:27:05,682:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-22 07:27:05,907:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-22 07:27:05,909:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-22 07:27:05,909:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-22 07:27:05,913:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:32 UTC. 2024-11-22 07:27:05,913:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-22 07:27:05,914:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-22 07:27:05,920:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-22 07:27:05,920:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-22 07:27:05,920:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-22 07:27:05,925:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-22 07:27:05,926:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-22 07:27:05,929:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-22 07:27:06,396:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-22 07:27:06,396:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:27:06 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "PiEFY16sQOI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-22 07:27:06,397:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-22 07:27:12,009:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8766_key-certbot.pem 2024-11-22 07:27:17,566:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8764_csr-certbot.pem 2024-11-22 07:27:17,567:DEBUG:acme.client:Requesting fresh nonce 2024-11-22 07:27:17,567:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-22 07:27:17,724:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-22 07:27:17,725:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:27:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eYk8fkgTs2nn-v7-sbKlm5OxjK17b2PDsSQ4ity9Pjt3Igc2czU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-22 07:27:17,725:DEBUG:acme.client:Storing nonce: eYk8fkgTs2nn-v7-sbKlm5OxjK17b2PDsSQ4ity9Pjt3Igc2czU 2024-11-22 07:27:17,725:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-11-22 07:27:17,731:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZVlrOGZrZ1RzMm5uLXY3LXNiS2xtNU94aksxN2IyUERzU1E0aXR5OVBqdDNJZ2MyY3pVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HWQj2_pYo2rI5DcmXUWAFmKsVkiDj5f1Jx8k1EhaKWXh57PAbUAUbc73JYShjzM9gyz6VBZdYJgDjjAM9ouRvDc0VTIcIOGqg6bOdvEI_i3HWrJ88MSVTRZIB5oB3AIIiBZsExFMlelEbVB7SagDH959na1wyMjf85JRINm0l8FhokyxvEUmkvdAZXVreQFQTDsTGsU1o9yStYQIBHMMuL9GRet9-GzNv-yzUNRLZWCnWOwyO2AxSvc9eu_Fm4R4FZuddFlSQvWFj56mjkjXHA_o2Q09bJ8hYWKy0ZXXnqdJzs6h8peeiTKO81N0xNK9bgvLLJIu_VGzbKwSAGMJbg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-22 07:27:17,924:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-22 07:27:17,925:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 22 Nov 2024 06:27:18 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335805657 Replay-Nonce: FVNV6H0MzYT4_17_b2N-9vKR4GONfd3XmExgZU98aO_z3vnI6Iw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:33:28Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386819677" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335805657" } 2024-11-22 07:27:17,925:DEBUG:acme.client:Storing nonce: FVNV6H0MzYT4_17_b2N-9vKR4GONfd3XmExgZU98aO_z3vnI6Iw 2024-11-22 07:27:17,925:DEBUG:acme.client:JWS payload: b'' 2024-11-22 07:27:17,931:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/433386819677: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlZOVjZIME16WVQ0XzE3X2IyTi05dktSNEdPTmZkM1htRXhnWlU5OGFPX3ozdm5JNkl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80MzMzODY4MTk2NzcifQ", "signature": "ItKdsm7IBADUFi7KElA6EBZ3GNg4aG8P0_PROdamMZs_kKfW7eEQbtOlQMRRu2DKzRgf2tWzo6BfuFsCvGF5Xn0Gon7E5Q0mlIyOHe8i5xoGMSZJO8_e2N2VsoFKCvS8WmmKZao96yXxTqqkZFsSAcKwfWz9b2uSPgdfVctx-Vxl6fu8lHQyePrFGwA7IYNrI2XDyGU2ISeNRW6eLndr9ZI6LPyXzpoRXfsDqcxbIwI0lvilCKLE--EaJdDuv1VV8t09lXZbCouRTSCem_6TDBya2I6r80PHrXQt9aJvISvmhCj6PDg39Sxl_Pp3RKfX5bEwdmWDClSfcIS1bxqR8A", "payload": "" } 2024-11-22 07:27:18,094:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/433386819677 HTTP/1.1" 200 823 2024-11-22 07:27:18,094:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 22 Nov 2024 06:27:18 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FVNV6H0Mvw6I3pRVqVg3JhGCXUijj1Phdw-ZpLV6n2h1iTlXbLU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:33:28Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386819677/7gZi0Q", "status": "pending", "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386819677/-esrVQ", "status": "pending", "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/433386819677/-G9CyQ", "status": "pending", "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU" } ] } 2024-11-22 07:27:18,095:DEBUG:acme.client:Storing nonce: FVNV6H0Mvw6I3pRVqVg3JhGCXUijj1Phdw-ZpLV6n2h1iTlXbLU 2024-11-22 07:27:18,095:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-22 07:27:18,095:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-11-22 07:27:18,096:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-22 07:27:18,096:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-22 07:27:18,097:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:27:18,097:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-22 07:27:18,097:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-22 07:27:18,098:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-22 07:27:18,099:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-22 07:27:18,099:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-11-22 07:27:18,100:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-11-22 07:27:18,111:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-11-22 07:27:18,112:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)