2024-11-21 13:30:28,179:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-11-21 13:30:28,179:DEBUG:certbot._internal.main:Arguments: [] 2024-11-21 13:30:28,179:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-21 13:30:28,917:DEBUG:certbot._internal.log:Root logging level set at 20 2024-11-21 13:30:28,917:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-11-21 13:30:28,957:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-11-21 13:30:29,003:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-21 13:30:29,298:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:30:29,300:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-11-21 13:30:29,304:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-11-21 13:30:29,313:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:06 UTC. 2024-11-21 13:30:29,313:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:30:29,313:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:30:29,318:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:30:29,319:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:30:29,319:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:30:29,325:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:30:29,326:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:30:29,328:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:30:29,805:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:30:29,806:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:30:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9KDYvISCZQc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:30:29,807:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:30:35,914:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8739_key-certbot.pem 2024-11-21 13:30:41,654:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8737_csr-certbot.pem 2024-11-21 13:30:41,655:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:30:41,655:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:30:41,813:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:30:41,813:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:30:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxuUdq8R1_kDuahNYq5uIuvaFpdC28KcrJBCxX7yceTTs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:30:41,813:DEBUG:acme.client:Storing nonce: nHAuMvoxuUdq8R1_kDuahNYq5uIuvaFpdC28KcrJBCxX7yceTTs 2024-11-21 13:30:41,813:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:30:41,820:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3h1VWRxOFIxX2tEdWFoTllxNXVJdXZhRnBkQzI4S2NySkJDeFg3eWNlVFRzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Wp-EBgfB5BhoUvurrfw7Xb-3-2eGBMnuXPcuCylr_lax-GY80Oez6g06LeNIp5uH8VEozt69XOa5ZGIrLxVeforIjpqcTC16OPHpX0BM1n0yp69w8vd0E2lwmjqMotpYq1iFoKEdvcixFBjj-s6q1VEh9w__pdMuYnq36LDc2giZ-5emaXlvwiwhhbtsPE8mHJrV0sZoFqwNovEv11RPPyNaSI8GyHwr27ZOjM84gLjKB1gNkwfzZ1Pei1kceIyhnpHwlyeqNhHD5yYiIsPz-Uo5aeRdeJ3YC1M6LZnHan8MUpTghoCKtcLiQzkoTyP1_ljQGuYBcG4l6550ejQmHg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-21 13:30:42,010:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-21 13:30:42,011:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:30:42 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335168147 Replay-Nonce: nHAuMvoxOl0zpU32fTo3ULdLWi-8ISkvErmP7ZXp3YopiLCcowY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:30:42Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433385871837" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335168147" } 2024-11-21 13:30:42,011:DEBUG:acme.client:Storing nonce: nHAuMvoxOl0zpU32fTo3ULdLWi-8ISkvErmP7ZXp3YopiLCcowY 2024-11-21 13:30:42,011:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:30:42,017:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433385871837: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3hPbDB6cFUzMmZUbzNVTGRMV2ktOElTa3ZFcm1QN1pYcDNZb3BpTENjb3dZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODU4NzE4MzcifQ", "signature": "mGOpXNZ7Z_sNqEga6y8BKFINYWEsu-_b3vLo5RwnOmTZC3Phn9lquhmfpRSjiJQ_LRaPBpBLCHaixE9NN9_6ypPSpN2g6pHbhXJ14HFnwXTv9F92fMBrkZfcn3vpHeR_JXQm7rZE1LKiZ_ML0kHXTUojilS5RmcnuNZiNJeov7ABEP0AIyI1eiNYvgNPh_Z7UgLG7xmBXJuBN1MOGIZ7Fma__y8agFlh43TU8lJJR3B1SUV8KNJ2-uEMXfNByYvG3gfhxbJwv36_WIKpNH5l-vjrt5IHvAYK9qYZPsEumBAYFY10-Ub-nnLrua1EYSCpv9N2HvZE7Jscv7yRBZdGyg", "payload": "" } 2024-11-21 13:30:42,190:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433385871837 HTTP/1.1" 200 810 2024-11-21 13:30:42,191:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:30:42 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nupoH1wEilnOJj9whRzF3RHEywGSlg6k4IQ8etrYnoxM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:30:42Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433385871837/lzGNtw", "status": "pending", "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433385871837/UndPAg", "status": "pending", "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433385871837/08KxfQ", "status": "pending", "token": "rcpIhAa5GZhrdOxx-TLjPavMTZxn0INmKDc-qyP01Rg" } ] } 2024-11-21 13:30:42,191:DEBUG:acme.client:Storing nonce: q3AS6Q6nupoH1wEilnOJj9whRzF3RHEywGSlg6k4IQ8etrYnoxM 2024-11-21 13:30:42,192:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:30:42,192:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-11-21 13:30:42,204:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:30:42,204:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:30:42,207:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:30:42,207:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:30:42,208:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:30:42,208:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:30:42,213:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:30:42,254:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-21 13:30:42,466:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:30:42,467:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-21 13:30:42,468:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-21 13:30:42,473:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:27 UTC. 2024-11-21 13:30:42,473:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:30:42,474:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:30:42,479:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:30:42,479:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:30:42,479:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:30:42,495:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:30:42,495:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:30:42,497:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:30:42,944:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:30:42,945:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:30:42 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4WgV39L5y4E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:30:42,945:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:30:49,336:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8740_key-certbot.pem 2024-11-21 13:30:54,928:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8738_csr-certbot.pem 2024-11-21 13:30:54,929:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:30:54,929:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:30:55,078:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:30:55,078:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:30:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgX51GB_5Jk0TijwBfJZ2ERKiZ2ykGV2J4_1P_p5lCherg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:30:55,079:DEBUG:acme.client:Storing nonce: usf-jMgX51GB_5Jk0TijwBfJZ2ERKiZ2ykGV2J4_1P_p5lCherg 2024-11-21 13:30:55,079:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:30:55,085:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1g1MUdCXzVKazBUaWp3QmZKWjJFUktpWjJ5a0dWMko0XzFQX3A1bENoZXJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "x59BkqtWCdWSIhrjI0q-wWvp1CfUrlMAI-sEriQzn5FFV3RaQ_XV-Q4nf1aLpnmr47K9FyUunngdCuTbACyxxkfL061DG_Ea1kdXrXVRJUdJxn3bmd9tpoeWNPS8xeFkO6DXfrePowC3RSO45RIRa-3M_DXdffyPhJtKEhZdRCFHFbfoBMofBs03UzT1D6wiccfAF-c7F8vsUo1ZxlsfQ54MXGav0BkkpzGjeUbVjg6yfxanMsrJVQgoHF5lrXf0rOP_dH-ex-1GAc6buA56M-oXaqblUXSKgx85MiiebHFau4rGEHGoxWtkxWUyUjc2a99kwaDrgYjrKVUX8GA1WQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-21 13:30:55,387:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-11-21 13:30:55,388:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:30:55 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335212297 Replay-Nonce: usf-jMgXdgBXIo2z5SCIT4jBJJ9ADpSrIVo4WZT5i_sVkCOZePI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:30:55Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433385936637" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335212297" } 2024-11-21 13:30:55,388:DEBUG:acme.client:Storing nonce: usf-jMgXdgBXIo2z5SCIT4jBJJ9ADpSrIVo4WZT5i_sVkCOZePI 2024-11-21 13:30:55,388:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:30:55,394:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433385936637: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hkZ0JYSW8yejVTQ0lUNGpCSko5QURwU3JJVm80V1pUNWlfc1ZrQ09aZVBJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODU5MzY2MzcifQ", "signature": "twmfzz7y_GFejaHv2xLhAY8fNBriaiJaMnDTwsmuajTZ7ttXWtYtHZFu5jyl6LBs-KV6RJDm00kYrDdK2wehyKUwQFCJsAnCLK5flsuGuViEkcJU6Kt4xq9nzaHcRo9T8JK2CwgCZvrZQKFa5dcmkPW_D26_paFADbwms-8GIq0HvPQyp4JWmOwRjHaCCsFBr1W8QN0kO41B71y_b9CikqnjYmmgBm4rsOhcBRrfjDTO01eAXx29P0sLLMuCFNFHoAmTskVRjoJ8Tkbr1BotvRtP43tS8Y0KDcceJCELz5vunrol4k09I3Xulnd2gfa1i2xfrRz78PIsMiOlfbIMqg", "payload": "" } 2024-11-21 13:30:55,547:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433385936637 HTTP/1.1" 200 804 2024-11-21 13:30:55,548:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:30:55 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXwfgy2PzvAGNe13nM_O_E2aMOGsVVIvlyfNwx73XwuHo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:30:55Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433385936637/UMKluQ", "status": "pending", "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433385936637/bnCyvA", "status": "pending", "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433385936637/Q-td3A", "status": "pending", "token": "K8wV2efN6-hQHAz7uACwrqPvEpk-ThxiOOwSN-Qu8-I" } ] } 2024-11-21 13:30:55,548:DEBUG:acme.client:Storing nonce: usf-jMgXwfgy2PzvAGNe13nM_O_E2aMOGsVVIvlyfNwx73XwuHo 2024-11-21 13:30:55,548:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:30:55,549:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-11-21 13:30:55,549:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:30:55,549:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:30:55,550:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:30:55,550:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:30:55,550:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:30:55,551:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:30:55,552:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:30:55,592:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-21 13:30:55,925:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 511 2024-11-21 13:30:55,938:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-21 13:30:55,939:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-21 13:30:55,943:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:47 UTC. 2024-11-21 13:30:55,943:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:30:55,944:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:30:55,949:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:30:55,949:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:30:55,949:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:30:55,954:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:30:55,955:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:30:55,957:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:30:56,402:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:30:56,402:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:30:56 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "fnSTA6zJsow": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:30:56,403:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:31:02,594:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8741_key-certbot.pem 2024-11-21 13:31:08,293:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8739_csr-certbot.pem 2024-11-21 13:31:08,293:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:31:08,293:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:31:08,441:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:31:08,442:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXGdLGZVGLJ_cGvPShGrCE_9IHKXqf0rCEOiUr7VTNmX0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:31:08,443:DEBUG:acme.client:Storing nonce: usf-jMgXGdLGZVGLJ_cGvPShGrCE_9IHKXqf0rCEOiUr7VTNmX0 2024-11-21 13:31:08,443:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:31:08,449:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hHZExHWlZHTEpfY0d2UFNoR3JDRV85SUhLWHFmMHJDRU9pVXI3VlRObVgwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "k5ppLWmsarSb4ZdyV69hV7rCe2_W06qysUyouIITY88XEdo9D9tRlUc0eBqSXiiJloCM5W6xRhQEJsVaUa5T6JA25iXPvzWhkMQLF4eOr5ZEZiHevEiMxLqXg8po6FYYSuMN9sY9nBmVI4VoeFpnzcPhTrqquUNFdTEvPakapm4HCqlmeOvfUHdxJQq-WV5tbyUrKMIHa2jbFkRz71OjEjsjY7O483cgiBzLXf55TtEQmla_dsD5oHtbIqTaC3gu20XLOUkJT1mv9DKIhZNSiIucg8tuIDMMi-8o7nK8jy7fKtV2_uZaWzKqAgSJV7jhgcARCEMeIhI3zWYWLdY7EA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-21 13:31:08,790:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-21 13:31:08,790:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:31:08 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335268447 Replay-Nonce: usf-jMgXTtidh6-5BIeAVDgHjdgpEyUXMxby6Ddd6B0lDdHgB90 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:08Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386017137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335268447" } 2024-11-21 13:31:08,791:DEBUG:acme.client:Storing nonce: usf-jMgXTtidh6-5BIeAVDgHjdgpEyUXMxby6Ddd6B0lDdHgB90 2024-11-21 13:31:08,791:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:31:08,797:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386017137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hUdGlkaDYtNUJJZUFWRGdIamRncEV5VVhNeGJ5NkRkZDZCMGxEZEhnQjkwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODYwMTcxMzcifQ", "signature": "HWx0sH_XmtPN5DplK-kqY1sYS7jehNeU659AJpOiLD5_cS04xX0F_Oou7SVzXWIIh_XRHsNcSYwOzp1-mJfMGu4ZzRvjreTLj0OgEmYnXjsd5n5N8CU9NT120zBazAx8px4uLEwK-VYv2EpIvoYk07P1IRuiPtiaFGdV_-7n8rUKhZjNVXKNq_OD5quhMhh3hDac9wKonTCyTP306vDJzvnNsukLo88VKu1RsVQyAg4ExeXMP-hge_SGjWT1ytZoJB3hy3SCyj8EvzujZ_vKXt6pvkGe4hU3fQ6QqdqpW7pieFy3ZIG5myJnZUmCpkx705m0PYjT1yIe8RTMSU6C2A", "payload": "" } 2024-11-21 13:31:08,951:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433386017137 HTTP/1.1" 200 807 2024-11-21 13:31:08,952:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:08 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqr5mL9RBVFzv7fvHqEiOeHxk0KU2z9IADCZzOLeZli7Dw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:08Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386017137/5ns8sQ", "status": "pending", "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386017137/4FswZw", "status": "pending", "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386017137/Q2i4ow", "status": "pending", "token": "c6Ycls24FP8LypuU4-Dm7wdA0lqQCLan7S18H13VWCY" } ] } 2024-11-21 13:31:08,952:DEBUG:acme.client:Storing nonce: JNlwFRqr5mL9RBVFzv7fvHqEiOeHxk0KU2z9IADCZzOLeZli7Dw 2024-11-21 13:31:08,952:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:31:08,953:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-11-21 13:31:08,953:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:31:08,953:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:31:08,954:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:31:08,954:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:31:08,954:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:31:08,955:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:31:08,956:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:31:08,997:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-21 13:31:09,253:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:31:09,254:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-11-21 13:31:09,255:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-11-21 13:31:09,259:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-11-21 13:31:09,263:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:31:09,302:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-21 13:31:09,467:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:31:09,468:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-21 13:31:09,469:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-21 13:31:09,474:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:08 UTC. 2024-11-21 13:31:09,475:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:31:09,475:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:31:09,480:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:31:09,480:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:31:09,480:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:31:09,485:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:31:09,486:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:31:09,487:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:31:09,936:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:31:09,937:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:09 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "EGdS2Grmm9E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:31:09,937:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:31:15,875:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8742_key-certbot.pem 2024-11-21 13:31:21,405:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8740_csr-certbot.pem 2024-11-21 13:31:21,406:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:31:21,406:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:31:21,556:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:31:21,556:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqr_ylfhftJDYpSEF2NT4zYtRaxmGeDzxccIavYgVb31Bg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:31:21,556:DEBUG:acme.client:Storing nonce: JNlwFRqr_ylfhftJDYpSEF2NT4zYtRaxmGeDzxccIavYgVb31Bg 2024-11-21 13:31:21,557:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:31:21,563:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJfeWxmaGZ0SkRZcFNFRjJOVDR6WXRSYXhtR2VEenhjY0lhdllnVmIzMUJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tWB9EWgdZmGZvUoaPnEl2sWtlFYw9iqiUkfoX5kcUbem7r6cbOPnyduvfAj39CLZsDA_aZVbqdMoLnYIJyg5WZItsctmTv8KyBx804TbJBDM_ACPY0HOPVuyiBJpX6Q7TH6glf0OsAZKX6p-KAICszl8L858lI623dhxZZAsPs-tQ2BwrdJTCZag2_6r9IULsNvnQlCeSALgMqpST4f6yalkgAfQJU1TNhfV3C3z02HRkKRdBdmIOvEUUDH7fn-xQK0ylNSnS5fmlgGfN-99e1am76jE2nAXByNx0nnYlkGNyh_51Glatptd58OYwi7q08ExilodORC_01V6qGoXkQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-21 13:31:21,839:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-11-21 13:31:21,839:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:31:21 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335319597 Replay-Nonce: JNlwFRqrPnJbx1eyjnnS4PYSY3pdiqZ_7Q9fZNL28y04Z8USX6A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:21Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386094387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335319597" } 2024-11-21 13:31:21,840:DEBUG:acme.client:Storing nonce: JNlwFRqrPnJbx1eyjnnS4PYSY3pdiqZ_7Q9fZNL28y04Z8USX6A 2024-11-21 13:31:21,840:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:31:21,846:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386094387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJQbkpieDFleWpublM0UFlTWTNwZGlxWl83UTlmWk5MMjh5MDRaOFVTWDZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODYwOTQzODcifQ", "signature": "OwzWiWoYuLBFQ_hvkPataV_Q-a_OZdAEy6_3pLtyZarVDbAzZRL_g4WpSos5aRa4tin6hCcZcJeOgJBifX5BFLv2ERxb_v-HIbm8Y6UFMz_EHyI3zGzdDkfulmzE01e5ZGXpkxoi4Jfph4okZ3ut_HdnSuc1Cn6Teb1W_-GbQVXuwn-soX-3OZnThipCMocneXYk-uNnAlCWYzCBxaP9UH82-Ui4x1wWwqH7MUe5wQ0EDl28SYOgweLz51nFkvX2bESzA-74tjgKPt2rla6SFjpyorUY7h8KbTlv9FBJzQwW06xNHc0fWsDk1zeiMICLhlRFgbsC6r9rEyi8TPrvtQ", "payload": "" } 2024-11-21 13:31:22,000:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433386094387 HTTP/1.1" 200 801 2024-11-21 13:31:22,000:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:22 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrHgxDOiV9C4wO94bCeLqcJGPndthd51LdI72QVEOHkGk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:21Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386094387/-o13Yw", "status": "pending", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386094387/C_-m4Q", "status": "pending", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386094387/GfKRvQ", "status": "pending", "token": "EvCidhBGDXxsofRf8F2PM3jCB1YcYtM6qFrIbqOGtxE" } ] } 2024-11-21 13:31:22,001:DEBUG:acme.client:Storing nonce: JNlwFRqrHgxDOiV9C4wO94bCeLqcJGPndthd51LdI72QVEOHkGk 2024-11-21 13:31:22,001:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:31:22,001:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-11-21 13:31:22,002:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:31:22,002:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:31:22,003:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:31:22,003:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:31:22,003:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:31:22,004:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:31:22,005:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:31:22,056:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-21 13:31:22,242:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:31:22,243:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-21 13:31:22,244:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-21 13:31:22,249:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:27 UTC. 2024-11-21 13:31:22,249:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:31:22,250:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:31:22,255:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:31:22,256:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:31:22,256:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:31:22,261:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:31:22,262:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:31:22,264:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:31:22,742:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:31:22,742:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:22 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LVFZatPkL8c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:31:22,743:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:31:28,321:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8743_key-certbot.pem 2024-11-21 13:31:33,892:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8741_csr-certbot.pem 2024-11-21 13:31:33,893:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:31:33,893:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:31:34,053:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:31:34,054:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nECqws9WehRnWYnTsK3lpvFBh1eYK2iOF3QLYEpRDkSU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:31:34,054:DEBUG:acme.client:Storing nonce: q3AS6Q6nECqws9WehRnWYnTsK3lpvFBh1eYK2iOF3QLYEpRDkSU 2024-11-21 13:31:34,055:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:31:34,061:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5FQ3F3czlXZWhSbldZblRzSzNscHZGQmgxZVlLMmlPRjNRTFlFcFJEa1NVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PEFTmOOPcv917DFPCucEKgdis8n37PEOVyGUFcmIQPcG1BgUgKLsJ_wkSvSqjPjCwlgDbV2N63HcSJjTHi_qkL4lEaH1y4TlUx1i94yqqFobIe8Y57CORftioLwOdgnlpFM1EYTjinvMD8nE_Iur22bcLH6JAfeGg1H0tKDGSFYZbdx5cU3HJbojmLhZnnuL_dnaj85FUuJw23--OUzDOmcfEVvaY_XEzWG36zZCreb0kUDn_HTOQNK8sxRQ1Y_D_CeFAObmphAtJLBgZPG5YYN-nwvkQ6flP4ozYzavazJcDju63NW7N9V9P9HG9nVmKSr3enzayYqK8yK-yT-BPQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-21 13:31:34,253:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-21 13:31:34,254:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:31:34 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335362247 Replay-Nonce: nHAuMvoxbDSeqIdUY4EI07EZU0J0s1_GJE_tAMA7nVJS5PV4g0U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:34Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386161497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335362247" } 2024-11-21 13:31:34,254:DEBUG:acme.client:Storing nonce: nHAuMvoxbDSeqIdUY4EI07EZU0J0s1_GJE_tAMA7nVJS5PV4g0U 2024-11-21 13:31:34,254:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:31:34,260:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386161497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3hiRFNlcUlkVVk0RUkwN0VaVTBKMHMxX0dKRV90QU1BN25WSlM1UFY0ZzBVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODYxNjE0OTcifQ", "signature": "hE80C9vAaCgUqYvhW3E3KSK3WHRUnE9zakwmIa4MuGwszCIcAdfpHbV_PsqujCz161u87_rj0JBYP49xSR1XDdVNKDmawB6pjmRR0AO4_lTZDfhclfeslrl2J3BYyUa0GVm86pqnmf79qphnnI9Z0QJE270bP57hHifiKkg-92K5vwrVkuNGYThEWYcaf3oTi9dTC9NSTved-GvTsfglAAHpoU8jKNAs17ytnxaVOyoQnI07DhDzcy5mtt9KfoIodrLfw6M6c2C39ku6AdNCmy5FvD4q-mimdxazZnNqdeCCk-fYobVlAInVJh6P8s6tgfNnJLQUpIJKaZcjKSrFLA", "payload": "" } 2024-11-21 13:31:34,426:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433386161497 HTTP/1.1" 200 805 2024-11-21 13:31:34,426:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:34 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nFP2obcfMRNLEecq5BkXT87E0TjnwBOgXUGy0-CdxBzw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:34Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386161497/SgjmHQ", "status": "pending", "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386161497/G65eQA", "status": "pending", "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386161497/DvhIEA", "status": "pending", "token": "SAn0r0OlE12dKi1PMUX9ixWemWYAMzH50HznQNtzUgI" } ] } 2024-11-21 13:31:34,426:DEBUG:acme.client:Storing nonce: q3AS6Q6nFP2obcfMRNLEecq5BkXT87E0TjnwBOgXUGy0-CdxBzw 2024-11-21 13:31:34,427:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:31:34,427:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-11-21 13:31:34,427:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:31:34,427:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:31:34,428:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:31:34,428:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:31:34,428:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:31:34,429:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:31:34,430:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:31:34,481:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-21 13:31:34,675:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:31:34,677:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-21 13:31:34,677:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-21 13:31:34,681:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:58 UTC. 2024-11-21 13:31:34,681:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:31:34,682:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:31:34,687:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:31:34,687:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:31:34,687:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:31:34,692:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:31:34,693:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:31:34,695:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:31:35,139:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:31:35,140:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:35 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "f0UBNnshKac": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:31:35,141:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:31:41,249:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8744_key-certbot.pem 2024-11-21 13:31:46,728:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8742_csr-certbot.pem 2024-11-21 13:31:46,728:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:31:46,729:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:31:46,876:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:31:46,877:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXHqo_aniIElISbVgbMRrKMJ1GR-F6QjrBAPCQ09dSUs0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:31:46,877:DEBUG:acme.client:Storing nonce: usf-jMgXHqo_aniIElISbVgbMRrKMJ1GR-F6QjrBAPCQ09dSUs0 2024-11-21 13:31:46,877:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:31:46,883:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hIcW9fYW5pSUVsSVNiVmdiTVJyS01KMUdSLUY2UWpyQkFQQ1EwOWRTVXMwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QA_6_Od11FzphxJLAwDkhoir5vh5NTnk2otqceiIQTA0CQGiiwYxTgZzE1PPGmWf9kvm6BDTeAQzWuNPzp1sp8XyMJpOJCw3HwhOsWE0i_ESSfjS677Ox75ApE1hOXXzETHgQlPs-3AICXRv6nGmnKlqtoJvcn-HKR2fSmMD_Iz37pvp1ShsKzO3IK_w42wjawFseQKBLjEpfmHG8o98oVvfXRvMgIGK9PAGdEIEbTI2tOx5-Am7HRJ8SM0qds60sir0JJiBYzViFfrmbIZrxjFN5KJXJMP1WP5YyDylOa5YvqTWtHOGVVqDq0BiETtdBQke4LJDe45PDF1Jk5sh5w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-21 13:31:47,186:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-11-21 13:31:47,186:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:31:47 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335405237 Replay-Nonce: JNlwFRqr-nNfNWu1r2MrhnJDjJb9YCXxh3a_7Hj44-N9Won1QeU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:47Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386225357" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335405237" } 2024-11-21 13:31:47,186:DEBUG:acme.client:Storing nonce: JNlwFRqr-nNfNWu1r2MrhnJDjJb9YCXxh3a_7Hj44-N9Won1QeU 2024-11-21 13:31:47,187:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:31:47,193:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386225357: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXItbk5mTld1MXIyTXJobkpEakpiOVlDWHhoM2FfN0hqNDQtTjlXb24xUWVVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODYyMjUzNTcifQ", "signature": "b_-h384u5QxuexDGjZMuQdFKNFUqRP8xUPe_RPqsmmorLmXtjOWkf9PxWKQ5ozhDtOyxsT9GyrhH5XS2vXEGEavgFmji2U1DcF-42cLmllK_kRPPCkX4tnc1Q_7jBda5qN5KXhE9HVvq7-EepoJo0MLF7ILVCizpuOk5BGE0ti2a8qDJCaFb4G-GetJZkwITHUJ72x8ikwt1zwZZCTJnKralumS68w9GprJdGg4trILK-POBsOU1vTS9mN11nTbb-YYSpjw1EmOVGn3V78sG5gfM0W8T5KRf2dV_YOQzV-SEY5-uQQTXZNrK253uMJy0LNrtIGgX6VkUwSuvDzfI_Q", "payload": "" } 2024-11-21 13:31:47,345:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433386225357 HTTP/1.1" 200 809 2024-11-21 13:31:47,346:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:47 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrc9k2M8jyDDl5q8fMBk0-JN0-VfdGvO0fbFtYiNVVv4E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:47Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386225357/rcFeQQ", "status": "pending", "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386225357/ZOgoCA", "status": "pending", "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386225357/bpWWxw", "status": "pending", "token": "LKUT7jy2V5uy4BAUMYhSR9DRDYEix0LxyXOW-jsOwYU" } ] } 2024-11-21 13:31:47,346:DEBUG:acme.client:Storing nonce: JNlwFRqrc9k2M8jyDDl5q8fMBk0-JN0-VfdGvO0fbFtYiNVVv4E 2024-11-21 13:31:47,347:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:31:47,347:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-11-21 13:31:47,347:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:31:47,348:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:31:47,348:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:31:47,349:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:31:47,349:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:31:47,349:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:31:47,351:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:31:47,398:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-21 13:31:47,668:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:31:47,669:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2024-11-21 13:31:47,670:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2024-11-21 13:31:47,674:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:15 UTC. 2024-11-21 13:31:47,674:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:31:47,674:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:31:47,680:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:31:47,680:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:31:47,680:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:31:47,696:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:31:47,697:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:31:47,699:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:31:48,178:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:31:48,178:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:48 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "goK3iwShkrw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:31:48,179:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:31:53,865:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8745_key-certbot.pem 2024-11-21 13:31:59,444:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8743_csr-certbot.pem 2024-11-21 13:31:59,444:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:31:59,444:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:31:59,604:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:31:59,605:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:59 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxvSYSUT5dlowoOwXEYBUN9VBAd863ViWoD2wUUJ8gXmQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:31:59,605:DEBUG:acme.client:Storing nonce: nHAuMvoxvSYSUT5dlowoOwXEYBUN9VBAd863ViWoD2wUUJ8gXmQ 2024-11-21 13:31:59,606:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:31:59,612:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3h2U1lTVVQ1ZGxvd29Pd1hFWUJVTjlWQkFkODYzVmlXb0Qyd1VVSjhnWG1RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "hkfZqw0Vso4Cw42Lg6lM6pLifliN3N6hivnr1SkrGCKWwo6jXDtW74w-DLJlqLAELlgsvjJV4eP8opspyhr_uFCLDH3eD6DQDpVkJSazU7Lkc3RITmFWBmYxZys-6ohwXrf2_jIVIwQ35e6GChp-gYds0ncbst2IIQONfBzOMCShszAhz84afJH_IPIbDFATZ_q9AeCZDdc_KwoJoS5TeTuNz7EbrYFqYl0ljGi9iCCGI9sn76NK4l5nLFzkylWDAsjz_rWOtwUF6KahOC9EwCITk-0IMvkV1Hfd95VNfBYZ8uHbrmScWRccL1zyJtjKk4xuDciz41oMXvpe7iNkxA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-21 13:31:59,802:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-21 13:31:59,802:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:31:59 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335446687 Replay-Nonce: nHAuMvoxjNXNNLcEABqvyRkfK1y62u5OAPJcfhme6zHXnRt-XuA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:31:59Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386288977" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335446687" } 2024-11-21 13:31:59,803:DEBUG:acme.client:Storing nonce: nHAuMvoxjNXNNLcEABqvyRkfK1y62u5OAPJcfhme6zHXnRt-XuA 2024-11-21 13:31:59,803:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:31:59,809:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386288977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3hqTlhOTkxjRUFCcXZ5UmtmSzF5NjJ1NU9BUEpjZmhtZTZ6SFhuUnQtWHVBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODYyODg5NzcifQ", "signature": "f3EBKtB370VeDNjWHCVhSGyhEjq__vUatVq9EuSJLJjUSNWW9-zEvCCGT7v56nflzkLBB9b8WBLlzglw1Cb-prV1TphkyGzhhwLuImhHw9xvcYqGEKF49B6tYq4k17WdHyuoWdVmpiMY4NRr8AVclYt_JkbqT54GfMjw13METkvZXgdY-H1257aF0PNqT-WO6BaCXh2FOlYgCbXYFtbukovxp1WJX1EcDuBeUdxy9FDFnNCSMyLkJImKM2M4525M-5wr8USrXCYHjZRgYC8PzUuIZVV9A5st69zJi093xRBSDTwuhyTriiX3abbU3wdetwrTsYa4yDl2qQL22lbsqQ", "payload": "" } 2024-11-21 13:31:59,973:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433386288977 HTTP/1.1" 200 807 2024-11-21 13:31:59,973:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:31:59 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nIHBB4isYYUJGuqc0NgWWPKjAyUaI8EiHRH4twmU_Ulw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:31:59Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386288977/74HdZw", "status": "pending", "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386288977/jzYzOg", "status": "pending", "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386288977/qrrE6g", "status": "pending", "token": "jr6ZbKOo_CPxVs3X1GkIZTmVaSoFaFe86WG1Y5DqnUE" } ] } 2024-11-21 13:31:59,974:DEBUG:acme.client:Storing nonce: q3AS6Q6nIHBB4isYYUJGuqc0NgWWPKjAyUaI8EiHRH4twmU_Ulw 2024-11-21 13:31:59,974:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:31:59,975:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-11-21 13:31:59,976:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:31:59,976:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:31:59,977:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:31:59,977:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:31:59,977:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:31:59,978:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:31:59,979:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:32:00,022:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-21 13:32:00,217:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:32:00,218:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-21 13:32:00,219:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-21 13:32:00,224:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:37 UTC. 2024-11-21 13:32:00,224:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:32:00,224:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:32:00,229:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:32:00,229:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:32:00,229:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:32:00,245:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:32:00,245:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:32:00,248:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:32:00,727:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:32:00,728:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:00 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Tl7EXtAQuTk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:32:00,728:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:32:06,460:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8746_key-certbot.pem 2024-11-21 13:32:11,995:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8744_csr-certbot.pem 2024-11-21 13:32:11,995:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:32:11,995:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:32:12,155:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:32:12,156:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6n1BjMtL3HOZpDtcO4Z2aEFr_pNV1GRV1nCaPyYnck_5w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:32:12,156:DEBUG:acme.client:Storing nonce: q3AS6Q6n1BjMtL3HOZpDtcO4Z2aEFr_pNV1GRV1nCaPyYnck_5w 2024-11-21 13:32:12,156:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:32:12,162:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm4xQmpNdEwzSE9acER0Y080WjJhRUZyX3BOVjFHUlYxbkNhUHlZbmNrXzV3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pXseo4P2RNwBZej1wUC8aeR4SQHX6ESZ4s7Dkd1TrehPRzNYbm7XYPm9F1oTmY59VjOhJER31xh2QYhERAkXf5c_JPKX4NKxI54leXouZey0kDlocYjkUGpAD4FsKTi2e9Icc_kQoo4Q_yX__K3WdjYU-LZN4pLqAbOfSnwQMbr1EqNAD8SL8YyYEc3MWfbIZLQAcmXdiYTaC9pAu8W3U8NjV7YK43alFzck1CN4995XtZyWPslZEp_y8aJg4mFSrfTnlthjQrMBkSvlnKGQ-NseoNLH2MbG5htdUFeIdWuQpnmywF_oS0z569TnpCM2EqvbMt9XvO_LLTM404znqQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-21 13:32:12,350:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-11-21 13:32:12,351:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:32:12 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335505847 Replay-Nonce: nHAuMvox2kkVk1-iPm2dbnTdS55KhRe8ydrvel27ges_6GrPcXw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:12Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386373457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335505847" } 2024-11-21 13:32:12,351:DEBUG:acme.client:Storing nonce: nHAuMvox2kkVk1-iPm2dbnTdS55KhRe8ydrvel27ges_6GrPcXw 2024-11-21 13:32:12,352:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:32:12,357:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386373457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3gya2tWazEtaVBtMmRiblRkUzU1S2hSZTh5ZHJ2ZWwyN2dlc182R3JQY1h3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODYzNzM0NTcifQ", "signature": "RTXgWGUK05UOLLKAH_KqHH7XQI3ku_PaixK0cY83pRQCFygKHD0jUSTmTARv-fNjCxhZkr9PPsWZH1jvJiQ11qwnqhsBkz2aRYJPc5tH--9DPgwXBv5kgGJtcfVOOD8GllthLfiC4GzipyCyUFQ66ahgwbLFxkSwIdq4fA9MGM8G5V3_ug7Y-VUkh-giLw7UkfK8IY0Qyx-9jPOykwt6piBw15-OZVAMBVhfhCau87EkSwsERk_JF_n3_514gXH_Mgm9Z-WAcjgY777hS9nKqtjWCwRc5XcdYP50gKAKktW7Y3hA8gCFDamoOUCVK_oU9dP0_Ym6IQT_8-tfeqYfWw", "payload": "" } 2024-11-21 13:32:12,522:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433386373457 HTTP/1.1" 200 806 2024-11-21 13:32:12,523:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:12 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nLKDqB5hecAJEmO3r3EgaKXjhH9nr9YwSh3K0qepUSKc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:12Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386373457/CBmaOg", "status": "pending", "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386373457/JJFsqQ", "status": "pending", "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386373457/d3Fmcw", "status": "pending", "token": "erTxmHhKIvwb5qbVKSEmhbRtBiNM1BgfTY5m7PfY2PI" } ] } 2024-11-21 13:32:12,523:DEBUG:acme.client:Storing nonce: q3AS6Q6nLKDqB5hecAJEmO3r3EgaKXjhH9nr9YwSh3K0qepUSKc 2024-11-21 13:32:12,524:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:32:12,524:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-11-21 13:32:12,524:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:32:12,525:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:32:12,525:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:32:12,526:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:32:12,526:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:32:12,526:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:32:12,527:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:32:12,573:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-11-21 13:32:12,573:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:32:12,573:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-11-21 13:32:12,581:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-11-21 13:32:12,583:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-11-21 13:32:12,583:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-11-21 13:32:12,583:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-21 13:32:12,584:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-11-21 13:32:12,585:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-21 13:32:12,626:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-21 13:32:12,815:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:32:12,816:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-21 13:32:12,817:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-21 13:32:12,823:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:56 UTC. 2024-11-21 13:32:12,823:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:32:12,824:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:32:12,828:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:32:12,829:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:32:12,829:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:32:12,834:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:32:12,834:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:32:12,837:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:32:13,320:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:32:13,320:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:13 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Dw5maxz_Ogk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:32:13,321:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:32:18,928:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8747_key-certbot.pem 2024-11-21 13:32:24,377:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8745_csr-certbot.pem 2024-11-21 13:32:24,378:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:32:24,378:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:32:24,540:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:32:24,540:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nkZL_qQqm54SEqi8Ux0X8bmc0jcKmBmz4NBHvErowpL0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:32:24,541:DEBUG:acme.client:Storing nonce: q3AS6Q6nkZL_qQqm54SEqi8Ux0X8bmc0jcKmBmz4NBHvErowpL0 2024-11-21 13:32:24,541:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:32:24,546:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5rWkxfcVFxbTU0U0VxaThVeDBYOGJtYzBqY0ttQm16NE5CSHZFcm93cEwwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "x8HfVkCrUcoEt7ovtCKASYnSE4bnkxrBQhVWzN-t8Pr7_ywbeFPEDJUEubaJXbkvzjKGHDbK-ZYJSuLWiGn2liD7HoJIK12PqueOJzQJIyQbdpraUvaSWT3CQh8jLszoNXrUjnMzXwqPZveIqV5wGPaUskQDaQlnxKaJDyTolFKXHYJngUe19I2kaMPsbiDPCgCysAmAwlihMzXT_0fh1_aBDyyI3rDzXrVTUt3XGkNVCH0QANKe0PIF-B1_pRRXS4Te3qsDhDfYZPZx3u9mjgf1DpmCAf8sLwoEzifw3CFKT5hmC_AH2hGQzdR7lznvUlee6heXYvLVMYmHX1Ya4g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-21 13:32:24,742:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-21 13:32:24,742:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:32:24 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335553997 Replay-Nonce: q3AS6Q6nYvlGqNvdH51BrxAU2bwGnpDCWxf5KEXfzROi1dQdrVc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:24Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386447927" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335553997" } 2024-11-21 13:32:24,742:DEBUG:acme.client:Storing nonce: q3AS6Q6nYvlGqNvdH51BrxAU2bwGnpDCWxf5KEXfzROi1dQdrVc 2024-11-21 13:32:24,742:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:32:24,748:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386447927: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5ZdmxHcU52ZEg1MUJyeEFVMmJ3R25wRENXeGY1S0VYZnpST2kxZFFkclZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODY0NDc5MjcifQ", "signature": "EhTBzN3r63VGuWVyqPX5CCtXcmHoMQ3EEq4Px_O_fq_WLHsYvtr-EGsw3xSNaZEm1BSWiVL11kUBzKwALKNdi_1_wexpVKriHNwnu0OYlTbr4iQHIP6FW7Csk8iYtEfaObF2zwjZrejZ4ahmoIsxwRmM4SE2S-zjOcVxvCe3WnFlIIbiiE4i33z5jnSx5wVToysLI90nc4-tVkDdD12SkUlGWpIn6tnWWRsS9NeuFCxiIqZw03xA4brqqN88TuklAP5uMvC6ZF2hFfQYu4cFSJqlZXfvIdWw_bgwEJDSI5Wvc48XfUlTW3jfmTHHXkw1gIcBvQvADn_pQH8OCzkySg", "payload": "" } 2024-11-21 13:32:24,915:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433386447927 HTTP/1.1" 200 811 2024-11-21 13:32:24,916:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:24 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxibiFb9tjkxSuidWKE9zqYbMPsIAbqK03MV3nIPc0mhA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:24Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386447927/PLs0Mg", "status": "pending", "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386447927/eNwFHQ", "status": "pending", "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386447927/lliEPw", "status": "pending", "token": "QAYPNFX1mMwpTs-cuXYjkxRmrRl-dnn7pNKhe1dmfaY" } ] } 2024-11-21 13:32:24,917:DEBUG:acme.client:Storing nonce: nHAuMvoxibiFb9tjkxSuidWKE9zqYbMPsIAbqK03MV3nIPc0mhA 2024-11-21 13:32:24,917:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:32:24,918:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-11-21 13:32:24,919:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:32:24,919:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:32:24,920:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:32:24,920:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:32:24,920:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:32:24,920:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:32:24,922:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:32:24,964:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-21 13:32:25,161:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:32:25,162:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-21 13:32:25,163:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-21 13:32:25,168:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:15 UTC. 2024-11-21 13:32:25,168:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:32:25,168:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:32:25,174:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:32:25,174:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:32:25,174:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:32:25,178:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:32:25,179:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:32:25,181:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:32:25,664:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:32:25,665:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:25 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NQneAGCeGOE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:32:25,665:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:32:31,298:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8748_key-certbot.pem 2024-11-21 13:32:36,879:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8746_csr-certbot.pem 2024-11-21 13:32:36,880:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:32:36,880:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:32:37,039:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:32:37,040:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nCQe3OkaIA6Znt45seAUkTnqvnyp09DIODiR3oVqcFVY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:32:37,040:DEBUG:acme.client:Storing nonce: q3AS6Q6nCQe3OkaIA6Znt45seAUkTnqvnyp09DIODiR3oVqcFVY 2024-11-21 13:32:37,040:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:32:37,046:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5DUWUzT2thSUE2Wm50NDVzZUFVa1RucXZueXAwOURJT0RpUjNvVnFjRlZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "GR-3rNt4qD7PVu7X_U64caasq5yd92y3wKoccOr_NMzYUsjTaBMLkERkYkAx2tPbcLPKM4ZGGsOEKyQp5gRZX_y_scv2Fo1U6QRhlxdJxlrLnV_c7k1rcGMGo5nHEYDspBRFO6OVK8bKJrn4TQrUIa2d8v3KyHXa5XJy8cs3sPnYtrxxMA0aI_FH74dnM4pvFio-49BsP6CSPSjJw-2FOZw60jI62nEzF0KPVmI1sLxjGnq9f0_vkLmDf5JmXPFEVOEIC9arPUBTg9ABUHBZzPbxOsmLQpy1koJHqKMvSsH5TdGGO5pZwBVM2WNcZFXS_mX6Skt490ggUISIGtSEYw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-21 13:32:37,252:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-21 13:32:37,252:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:32:37 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335602617 Replay-Nonce: q3AS6Q6nKIGGSR5bQFzgMsEDQ5DUNZeJ607Tue_eO8emF7KbFLY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:37Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386519187" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335602617" } 2024-11-21 13:32:37,252:DEBUG:acme.client:Storing nonce: q3AS6Q6nKIGGSR5bQFzgMsEDQ5DUNZeJ607Tue_eO8emF7KbFLY 2024-11-21 13:32:37,253:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:32:37,258:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386519187: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5LSUdHU1I1YlFGemdNc0VEUTVEVU5aZUo2MDdUdWVfZU84ZW1GN0tiRkxZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODY1MTkxODcifQ", "signature": "dZ5cmVEUo5kewILKfVbR015UKSXPB6Zi3_6AehvsWPCmYEbS6GCnatkXWTowif27JNPE1-H2yv0oMT32j71teGNtOlXS9U9ExpBuEZwMJX2beHafsvWG4vdyA590UqInnwrZwrUpXz0abmBd2nh0MIueFbyB7MeMtRfPD4YCwsLsahKkHZFoV2PKwtebsD-c4V3L0feNXCojYB8mfg-PPZP1GvlC_7hSEr6Nc5tNTxP14jMVyQtFn6ixvoG4ZcwwBwmYeB7Mj4gXx3bW1lXLBqBMM3LZnr3DyrNjiHqYQbNU0NVRS9p4XVW38DZ8rc2bLr2EofwxjL3roMHsw3Pztw", "payload": "" } 2024-11-21 13:32:37,423:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433386519187 HTTP/1.1" 200 810 2024-11-21 13:32:37,424:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:37 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxH8Scl9sz9tlHkujG3OsGRLXpdR_xBA0BbN5dSVhrZI8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:37Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386519187/XcgphA", "status": "pending", "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386519187/-jLYlg", "status": "pending", "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386519187/XHeZAA", "status": "pending", "token": "Kza06imJgrL5dTy65c0lzR5iiy3Evqgj_QFvJcb1rKk" } ] } 2024-11-21 13:32:37,424:DEBUG:acme.client:Storing nonce: nHAuMvoxH8Scl9sz9tlHkujG3OsGRLXpdR_xBA0BbN5dSVhrZI8 2024-11-21 13:32:37,425:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:32:37,425:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-11-21 13:32:37,425:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:32:37,425:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:32:37,426:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:32:37,426:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:32:37,426:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:32:37,426:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:32:37,428:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:32:37,466:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-21 13:32:37,629:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:32:37,630:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-11-21 13:32:37,631:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-11-21 13:32:37,635:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:32 UTC. 2024-11-21 13:32:37,635:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:32:37,636:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:32:37,641:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:32:37,641:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:32:37,641:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:32:37,646:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:32:37,647:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:32:37,649:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:32:38,131:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:32:38,132:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:38 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "auaN7zI-NcI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:32:38,132:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:32:43,977:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8749_key-certbot.pem 2024-11-21 13:32:49,456:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8747_csr-certbot.pem 2024-11-21 13:32:49,457:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:32:49,457:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:32:49,618:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:32:49,619:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nTIm2sPZv2XJZ7NwBWEY2W8NstrVnW1fo3Vqf4ubJdYk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:32:49,619:DEBUG:acme.client:Storing nonce: q3AS6Q6nTIm2sPZv2XJZ7NwBWEY2W8NstrVnW1fo3Vqf4ubJdYk 2024-11-21 13:32:49,620:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:32:49,627:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5USW0yc1BadjJYSlo3TndCV0VZMlc4TnN0clZuVzFmbzNWcWY0dWJKZFlrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "owoRzOVBHe7ZTsAcukWu6lkYmepKtH4dP-zpb9k8WpMP5jbpSoj-2E9IHzndSIYoUz9y57HuJ1IgBK0kXZWX6c5a1OaKcVk4fwuU6MVUY-r5S7BK8q0W40-J-uh84tS8FXFRT0MwF5Z2O5Ys30yD2fMuRYb2b4czzYgAQzNV5gEr8WnN97YKPe8eWHkIL9TEORX61gzx6loA43aeIUdj_j1_zQnE6ynZWODzkloBPLayx7LUsapvO3c_nVV_UcyJqLofZYjOi2-cSe-2mkC1MXXr-0xqkgHXYa0sBRe9PuVg3VqdUGSICGIPPsM6yt-RPrkNbazd3y5GCRLmhp2Zlw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-21 13:32:49,836:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-11-21 13:32:49,837:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:32:49 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335648247 Replay-Nonce: q3AS6Q6nHP2DdeOJFAQPklptED5cUObCkwNT6ZkB2k1rCoObSpQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:32:49Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386588377" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335648247" } 2024-11-21 13:32:49,837:DEBUG:acme.client:Storing nonce: q3AS6Q6nHP2DdeOJFAQPklptED5cUObCkwNT6ZkB2k1rCoObSpQ 2024-11-21 13:32:49,837:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:32:49,843:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386588377: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5IUDJEZGVPSkZBUVBrbHB0RUQ1Y1VPYkNrd05UNlprQjJrMXJDb09iU3BRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODY1ODgzNzcifQ", "signature": "hN_QgeCALarMbr1HRn6HoYMIwwGUA7J-NXe2ABOImiMVmmS_s6UaZ5X5PXXeefml5j0TbD6_Vkz3NNmIQM3HSEEksNHf3NcF-_w-KqochWIKT_TJ2bqfdncTtS0Z3T2Uri_NqlY5q-QqUqlVLTqTrb1pV5sRluNnGF7D_pC3Hk3yFj4aP6npd4CGJD5utgqKBZ6SPoYF-jiyKKpStBjPFIS-8gM5HcDpwu5ktUPwPDVrLx3zTPLUmwO7ynoLTPhwAeSxrqCBaLZ1kHZBN8hIKN-thOCMw-AxfQdIMy_uLVMBEGFOGwUjOL0QqSObALoE8rWmcrwiOkzXFEPqtyyloQ", "payload": "" } 2024-11-21 13:32:50,008:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433386588377 HTTP/1.1" 200 809 2024-11-21 13:32:50,009:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:50 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxwrUcKFfghZpdR5xTs2gDsfCXhgc5H2QRHH26TjajFds X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:32:49Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386588377/hneKNA", "status": "pending", "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386588377/67ZXmA", "status": "pending", "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386588377/mNBDgA", "status": "pending", "token": "sLt1Dl5AW0kFEGTocEWnxCugp-L7M8w0K2SvXgwOswQ" } ] } 2024-11-21 13:32:50,009:DEBUG:acme.client:Storing nonce: nHAuMvoxwrUcKFfghZpdR5xTs2gDsfCXhgc5H2QRHH26TjajFds 2024-11-21 13:32:50,009:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:32:50,010:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-11-21 13:32:50,010:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:32:50,010:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:32:50,011:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:32:50,011:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:32:50,012:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:32:50,012:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:32:50,013:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:32:50,061:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-21 13:32:50,278:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:32:50,280:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-11-21 13:32:50,280:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-11-21 13:32:50,285:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:52 UTC. 2024-11-21 13:32:50,285:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:32:50,285:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:32:50,290:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:32:50,290:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:32:50,291:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:32:50,295:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:32:50,296:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:32:50,298:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:32:50,768:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:32:50,769:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:32:50 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-5jEWbpUz5Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:32:50,769:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:32:56,892:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8750_key-certbot.pem 2024-11-21 13:33:02,355:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8748_csr-certbot.pem 2024-11-21 13:33:02,355:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:33:02,356:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:33:02,512:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:33:02,512:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:33:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nAM5wR8UP47CPZ-AXkLRdJZUvHxbRKfcvcdbTGBQUm3o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:33:02,513:DEBUG:acme.client:Storing nonce: q3AS6Q6nAM5wR8UP47CPZ-AXkLRdJZUvHxbRKfcvcdbTGBQUm3o 2024-11-21 13:33:02,513:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:33:02,519:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5BTTV3UjhVUDQ3Q1BaLUFYa0xSZEpaVXZIeGJSS2ZjdmNkYlRHQlFVbTNvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "G3DGixeJqkAiuhDc7vyN6Q-TizNb4StXmAWmlI2F5UmMmFDKgtukfdYuz4cL-O8M4kkMRBdCBJw3Gxc516HDktqJ--QsxBeZKVfgx6XwLVum2hgFgqT0lWopHZCw5M2niKQYhTq_2dAp9uIMvx8iq__lJX5It-KSOycBVlDNvN0jVy9CxLc_3XtXc6iWne5LSZDuD5L-zmnDfE7dpkP4UefAXaCyf4qsFhPGZbPojFI4cq6_rfILB0S5nCP_ceNY3YpRObEpMaO5u-3tO8jHTQwJ1au8Hib03hCfWzkwrSySwFEHBTKA2OmBELoLdR-wa8Tx8hlMZxnA3VYV_t7_cw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-21 13:33:02,698:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-21 13:33:02,699:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:33:02 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335696957 Replay-Nonce: nHAuMvoxdHYHhjGndi9aScdUtSz9aFWxo7zMDIKpA4AM4lIji-g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:33:02Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386660297" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335696957" } 2024-11-21 13:33:02,699:DEBUG:acme.client:Storing nonce: nHAuMvoxdHYHhjGndi9aScdUtSz9aFWxo7zMDIKpA4AM4lIji-g 2024-11-21 13:33:02,699:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:33:02,705:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386660297: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3hkSFlIaGpHbmRpOWFTY2RVdFN6OWFGV3hvN3pNRElLcEE0QU00bElqaS1nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODY2NjAyOTcifQ", "signature": "l1EkfwNjEec3Tan5g3DqcWm0CJwvyiW8wjcgPQd-sq-GagrAPd7poS30wPuKpz0bUbEXnO2NLwdzWWPgHL3Wkoo8HeLc9_mmGpYobL66lzcVovMauX6GGaGcwdKPj-rcE-d0BjKcLqgxfA0XDxIwA7ONOfEKk3evbZVfcxtvpsnqedZUdmwd7UXn26QFFlThdFttLZ_nP8G5Vqhb0opC6QQ15C_yl31ED14VNzzJnME-XEikoDarD9lrYNwGSVDCR3bLM0M_-_8IrFqJSUn7ICs7vJ0eW5MEKwdmt54FABMt0EudNvsh889ALcN1yNEorv7kVmBPN_fxjjRP4KtNcQ", "payload": "" } 2024-11-21 13:33:02,865:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433386660297 HTTP/1.1" 200 805 2024-11-21 13:33:02,866:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:33:02 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nK810aGsQOXaIWH6VXo2fKtaBqqbdpE1o30Qj3PBjj9o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:33:02Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386660297/hz_bKw", "status": "pending", "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386660297/9adDwA", "status": "pending", "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386660297/Jd3mYQ", "status": "pending", "token": "kizbByUh_-CHbKj8jv3OXEasqVK38gdvUvkcRGu9mwM" } ] } 2024-11-21 13:33:02,866:DEBUG:acme.client:Storing nonce: q3AS6Q6nK810aGsQOXaIWH6VXo2fKtaBqqbdpE1o30Qj3PBjj9o 2024-11-21 13:33:02,867:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:33:02,867:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-11-21 13:33:02,868:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:33:02,868:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:33:02,869:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:33:02,869:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:33:02,869:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:33:02,870:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:33:02,871:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:33:02,929:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-21 13:33:03,185:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:33:03,187:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-21 13:33:03,187:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-21 13:33:03,193:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:10 UTC. 2024-11-21 13:33:03,193:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:33:03,193:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:33:03,197:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:33:03,198:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:33:03,198:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:33:03,203:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:33:03,204:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:33:03,206:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:33:03,640:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:33:03,641:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:33:03 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "68zvLmGT_ok": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:33:03,641:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:33:10,007:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8751_key-certbot.pem 2024-11-21 13:33:15,544:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8749_csr-certbot.pem 2024-11-21 13:33:15,545:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:33:15,545:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:33:15,690:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:33:15,691:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:33:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrKrtjVvhLh1ocKhH-5jBuUq9U0OYMph2esbjd9_wgRyw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:33:15,691:DEBUG:acme.client:Storing nonce: JNlwFRqrKrtjVvhLh1ocKhH-5jBuUq9U0OYMph2esbjd9_wgRyw 2024-11-21 13:33:15,691:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:33:15,697:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJLcnRqVnZoTGgxb2NLaEgtNWpCdVVxOVUwT1lNcGgyZXNiamQ5X3dnUnl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wdB6OBNlPNcuMYBa-cqFpOC16L4J3mFWBNeE47IpFBTBUyERmBJZdw9PHdLyUiYG1AzgXQN36I3vSVtTPiUHrUyi9lmqylrCfpXeQPZwLfUnHrTHFN8YX0axAyEuVnCBHPdgDxcXgwgrvs3xv_swYtj7eKxlsW7GpzJrmqMs71rI1Q-eZx9KkLFVOKxdz_H7TIgFmprFmuuuRm13OCZtDoiu5YIotEBMB_m2Lc60rReQBA62Qds43Svhk_EqUfYo4SsWAOvG0uBzNA8vqITMaHVFq8egUJrfZNdjpKbnp6xG2YKDZS9qPRkxpD6o6sCQFQQ210o8EN0NjTpvN_ge6w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-21 13:33:15,965:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-21 13:33:15,966:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:33:15 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335757157 Replay-Nonce: usf-jMgXLYD73sH6BaHveL7nehFUenap4TrkwRI4qqt59bwfm9c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:33:15Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386749437" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335757157" } 2024-11-21 13:33:15,966:DEBUG:acme.client:Storing nonce: usf-jMgXLYD73sH6BaHveL7nehFUenap4TrkwRI4qqt59bwfm9c 2024-11-21 13:33:15,966:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:33:15,971:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386749437: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hMWUQ3M3NINkJhSHZlTDduZWhGVWVuYXA0VHJrd1JJNHFxdDU5YndmbTljIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODY3NDk0MzcifQ", "signature": "Bezj7U3F7sUyRCLj0vvlzgbCEQjYXBQF5NlTTgEBSH-bUwNuWpd9oAMeibwb_JMOHlQJqYIWgnMUcgNmxkii24QV4GyBWdzfkmdQix-IiHfZY1-4DGDKiTEkvP3Z6f47cGY0mWXV0KS5b3GsHxVcjqV0ZRgrKrMLRdcUhdmcDo4ls1WUeOpoJfK4GlSEOFH5dBvOsQeZrTcuBBmAWuNj-77g8Tm5H14MZi-jbMsbDISan9rlSmSMo3J7qLiw6Xq3RgtWTGkK_89bfFXbE-L2cGndHXx6D2xKZBDh_4oApHRJuDwqoWxacanQvt-0h9tA5ehsIQ6XcIwBOoTG-BXF4Q", "payload": "" } 2024-11-21 13:33:16,133:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433386749437 HTTP/1.1" 200 805 2024-11-21 13:33:16,134:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:33:16 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXhu78mCFUoMKdiYntVTx7k0ACSK-SlTNwqxruZd5cdH0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:33:15Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386749437/RcBV3Q", "status": "pending", "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386749437/ODSfIw", "status": "pending", "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386749437/hizs-Q", "status": "pending", "token": "bWcy8VSsiwU7x8_A26VUOQyugn7JShxPgFP0s8Hioh0" } ] } 2024-11-21 13:33:16,134:DEBUG:acme.client:Storing nonce: usf-jMgXhu78mCFUoMKdiYntVTx7k0ACSK-SlTNwqxruZd5cdH0 2024-11-21 13:33:16,134:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:33:16,135:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-11-21 13:33:16,135:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:33:16,136:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:33:16,136:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:33:16,137:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:33:16,137:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:33:16,137:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:33:16,138:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:33:16,188:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-21 13:33:16,440:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-21 13:33:16,441:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-21 13:33:16,442:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-21 13:33:16,446:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:32 UTC. 2024-11-21 13:33:16,446:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-21 13:33:16,447:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-21 13:33:16,451:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-21 13:33:16,451:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-21 13:33:16,451:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-21 13:33:16,456:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-21 13:33:16,457:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-21 13:33:16,459:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-21 13:33:16,925:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-21 13:33:16,925:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:33:16 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "ofzmvRYrvjs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-21 13:33:16,926:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-21 13:33:22,389:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8752_key-certbot.pem 2024-11-21 13:33:27,874:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8750_csr-certbot.pem 2024-11-21 13:33:27,875:DEBUG:acme.client:Requesting fresh nonce 2024-11-21 13:33:27,875:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-21 13:33:28,031:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-21 13:33:28,032:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:33:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxwEcpd-Ifq-ksg8goMNeGCjxCLjS69SdX70XfJY4TOoo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-21 13:33:28,032:DEBUG:acme.client:Storing nonce: nHAuMvoxwEcpd-Ifq-ksg8goMNeGCjxCLjS69SdX70XfJY4TOoo 2024-11-21 13:33:28,032:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-11-21 13:33:28,040:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3h3RWNwZC1JZnEta3NnOGdvTU5lR0NqeENMalM2OVNkWDcwWGZKWTRUT29vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nVpEMW1Mse6E7TLyGay3QfMqg1xjB6cAiBYC-H_HCmURbUaFWrpbgz-R27BQYkRoaqwtoUDq31-Nm6KV6rXg6ySluo_Ny_Sk1CdKCxElARyQL5nufIYvAEPrDPR03nVPLjVWyOEyLVFb_CunueizK06TmxY3sdKjCM7LTx36euo_qyEpIMG2RmOeBLcmV4WTnI45xsWAalCJpm2ICXS7eVz6BnTksjSzAwJe6_QuiFQ4_J2GmHupW73X-B8O3CcsXzDArSDakj2CUrfUn19rGfMloN5BbxS5YPFBJvtwqXMZCe_I0eMGU4vHEPcKgu6W8Cex25y4MCfdUXy6q-zCyA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-21 13:33:28,235:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-21 13:33:28,236:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 21 Nov 2024 12:33:28 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/325335805657 Replay-Nonce: nHAuMvox7Upf4H29HHvj46JDbFocjZxYz-OQWN9eR9w5LeWelqc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-28T12:33:28Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386819677" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/325335805657" } 2024-11-21 13:33:28,236:DEBUG:acme.client:Storing nonce: nHAuMvox7Upf4H29HHvj46JDbFocjZxYz-OQWN9eR9w5LeWelqc 2024-11-21 13:33:28,236:DEBUG:acme.client:JWS payload: b'' 2024-11-21 13:33:28,242:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/433386819677: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3g3VXBmNEgyOUhIdmo0NkpEYkZvY2paeFl6LU9RV045ZVI5dzVMZVdlbHFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MzMzODY4MTk2NzcifQ", "signature": "CSJOA5kAucokYcJck5LS_QIAoX0pDy33V0wXJfjIgcpBOW7u8oDU3Cn35tRHEIQnEpBbJS7-2wO6mJW09KVvrph7Th56Zl5QBkvjjn98ATIJBM0GISfZuJgFzspWTq8Z7pP2JuvMVAoxXqlJ7oKbZQ0uQkyK1rlfuepDUw7BPwMlJIzgvCF_8A5tGHi7UD-Fcmx8Z6Hp109EF0gV1m0kWpEKfBmhwhMZ9BG22VNEoO-dzsFSp-VXDwFPMaVMYK1VQnf904lMWdidkn8Q8YYmNWyO8GkQiZG7-leiHuTc6a62IUWbc6kAojZBw3w0RegQr6QJOcF6Ua1Gjz4x6_7c6w", "payload": "" } 2024-11-21 13:33:28,403:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/433386819677 HTTP/1.1" 200 805 2024-11-21 13:33:28,404:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 21 Nov 2024 12:33:28 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nzRDq6xbizxElDBDjNjAdZ3iDCoCw5Raz8YOgL7PqLg4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-28T12:33:28Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386819677/-esrVQ", "status": "pending", "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386819677/-G9CyQ", "status": "pending", "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/433386819677/7gZi0Q", "status": "pending", "token": "S-jbaF_-aPu3nqGM9fxhmXynoKO28BtJfWX4yl8NZtU" } ] } 2024-11-21 13:33:28,404:DEBUG:acme.client:Storing nonce: q3AS6Q6nzRDq6xbizxElDBDjNjAdZ3iDCoCw5Raz8YOgL7PqLg4 2024-11-21 13:33:28,404:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-21 13:33:28,405:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-11-21 13:33:28,405:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-21 13:33:28,406:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-21 13:33:28,407:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:33:28,407:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-21 13:33:28,407:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-21 13:33:28,407:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-21 13:33:28,408:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-21 13:33:28,409:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-11-21 13:33:28,409:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-11-21 13:33:28,420:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-11-21 13:33:28,421:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)