2024-11-20 17:47:40,230:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-11-20 17:47:40,230:DEBUG:certbot._internal.main:Arguments: [] 2024-11-20 17:47:40,230:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-20 17:47:41,557:DEBUG:certbot._internal.log:Root logging level set at 20 2024-11-20 17:47:41,557:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-11-20 17:47:41,608:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-11-20 17:47:41,662:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-20 17:47:41,872:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:47:41,874:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-11-20 17:47:41,879:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-11-20 17:47:41,888:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:06 UTC. 2024-11-20 17:47:41,888:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:47:41,889:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:47:41,895:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:47:41,896:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:47:41,896:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:47:41,904:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:47:41,905:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:47:41,908:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:47:42,374:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:47:42,375:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:47:36 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "BMK6qEubwAo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-20 17:47:42,376:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:47:52,487:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8725_key-certbot.pem 2024-11-20 17:48:01,934:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8723_csr-certbot.pem 2024-11-20 17:48:01,935:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:48:01,935:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:48:02,083:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:48:02,084:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:47:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrRAoPM_45mwQEsZNssEFEobKhdFtfDh6Qj6YuPhUcnEM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:48:02,084:DEBUG:acme.client:Storing nonce: JNlwFRqrRAoPM_45mwQEsZNssEFEobKhdFtfDh6Qj6YuPhUcnEM 2024-11-20 17:48:02,084:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:48:02,092:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJSQW9QTV80NW13UUVzWk5zc0VGRW9iS2hkRnRmRGg2UWo2WXVQaFVjbkVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "LIBgmTzMQnXObvinKWCakpUt7WoKwNXdfEBdeec7KD815iHTTI_q10rzKb4TxZeObkF3RcJlpbwN7b-ugJRm9nxTSVp29cgQMHxP9B3-l4PcyYxgFyqpeW3Gc65X5GmJEfxxVpxWDGB4X21jDwJxmII0hiBGH-sPz9Xbs8FufjZ0vI0TmidKgzYMSFIiQ3mQLA9xB8McNpukLU2KvCESZ3j7XxLbGSbiQMVXHO-lMHYCJidmNSEdz3UEbDnvw1_jc499jYF1WndYPCWxOzPHF9jhfub_JefQFPB9R00yj9D_qzPe0kAvbaRnApSblRNcZxwyBzgkTWDMAasD_HZniA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-20 17:48:02,261:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-20 17:48:02,262:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:47:56 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863894397 Replay-Nonce: JNlwFRqrkBHYv6jBFTZI62BOlO-DMBgKNCXEmd_W7WpM7Sfss2I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:15Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863894397" } 2024-11-20 17:48:02,262:DEBUG:acme.client:Storing nonce: JNlwFRqrkBHYv6jBFTZI62BOlO-DMBgKNCXEmd_W7WpM7Sfss2I 2024-11-20 17:48:02,262:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:48:02,270:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJrQkhZdjZqQkZUWkk2MkJPbE8tRE1CZ0tOQ1hFbWRfVzdXcE03U2ZzczJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYwNjIzMTcifQ", "signature": "hmm8p1GonJqmblt0rFNLgPzXS6Gr3eDspKk3ZH6fgn4yRNhvPIw392KwaAzfbX9IYgpeMbmdsB8ybDZhsJA0WXYNvHtxY8dIntZPTTpZGW-5eswo8WoG8VnsJxHrpcMW4q4KohNKqoXsAK07nV3exw72rITgG4Vb0E-gc2jwBKudhr3ITsGNZTZ5rLLnaVmXGq7m30OlITJIY0d1J0tF4H2XESA3bq7gdBkq-k7Y7pIQXWtMm90nqWFN9sLNVDu-GrLvEfunHRuC5LkiPG5cORN1CvhjaEoseoYI3dUSp-StqleN9UW7aBHsXLSb7a2PJH4BjNgV-NQ2eugOg-ywWA", "payload": "" } 2024-11-20 17:48:02,426:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776062317 HTTP/1.1" 200 810 2024-11-20 17:48:02,426:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:47:56 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXgDM9tvsNE8cpLPdKtTEXDms6FyCuqaHKMdxiK869BeY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:15Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Nohq5w", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/_bn1HA", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Fppccw", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" } ] } 2024-11-20 17:48:02,427:DEBUG:acme.client:Storing nonce: usf-jMgXgDM9tvsNE8cpLPdKtTEXDms6FyCuqaHKMdxiK869BeY 2024-11-20 17:48:02,428:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:48:02,428:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-11-20 17:48:02,439:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:48:02,439:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:48:02,444:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:48:02,444:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:48:02,444:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:48:02,445:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:48:02,452:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:48:02,507:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-20 17:48:02,698:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:48:02,700:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-20 17:48:02,701:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-20 17:48:02,707:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:27 UTC. 2024-11-20 17:48:02,707:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:48:02,708:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:48:02,714:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:48:02,715:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:48:02,715:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:48:02,723:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:48:02,724:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:48:02,727:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:48:03,182:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:48:03,183:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:47:57 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "E9gyF7xigMs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-20 17:48:03,184:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:48:11,408:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8726_key-certbot.pem 2024-11-20 17:48:18,808:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8724_csr-certbot.pem 2024-11-20 17:48:18,809:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:48:18,809:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:48:18,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:48:18,962:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:48:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXTLABtolKW_bbTRg4beLAXAnnFq_HwzRQYefuJvu3GeQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:48:18,962:DEBUG:acme.client:Storing nonce: usf-jMgXTLABtolKW_bbTRg4beLAXAnnFq_HwzRQYefuJvu3GeQ 2024-11-20 17:48:18,963:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:48:18,970:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hUTEFCdG9sS1dfYmJUUmc0YmVMQVhBbm5GcV9Id3pSUVllZnVKdnUzR2VRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "l8GI_T8VBqvcZPS1r5JWdmDQtdIYC1ryLv88U-nier8EpzGnMyqBM5AnF25pF2cbI7KTw5hYURLA2_qGRmCPSnaeebWTZQNiDTsFw5dgqIhHWWJ8mkz2cO0gvziw5GOYbFrCmt_Byd5f3cCkjv9oebKcgstA7n7CPLqLudldgtx9HbeOr9Q21j1wDcmn-FFI-JWu0WS0cxXK5dU7-IcPzPAWzP3-7oM8M3ul9WPXoC07uQ0XjMKkO3lB6wPP58ScusDZAIEBdSVsFgwMAID0Y812zoa-Y-78NfgHNvpkZOQFZteyPVpBtDeOSh_th_sQPB4mweZqhE-h3FbT5FEshQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-20 17:48:19,167:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-11-20 17:48:19,167:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:48:13 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863990237 Replay-Nonce: JNlwFRqrHYNFFQ8o9aeWzvTXqVWN62gUYUc65VLWLqSxKql4uug X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:28Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863990237" } 2024-11-20 17:48:19,168:DEBUG:acme.client:Storing nonce: JNlwFRqrHYNFFQ8o9aeWzvTXqVWN62gUYUc65VLWLqSxKql4uug 2024-11-20 17:48:19,168:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:48:19,175:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJIWU5GRlE4bzlhZVd6dlRYcVZXTjYyZ1VZVWM2NVZMV0xxU3hLcWw0dXVnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYxOTEyMjcifQ", "signature": "M21Cuf-8cn5MMoxlFmE4s0Z-rXsNpKuHWwQsq8_-D17kZr0TCsB-18V4FFcjrly7nXnRxj4uwGK25zuGPbc8b3XMLdEhVsF8N3Dq_FAWm8-HnNnwIKbT9MsSLCOb8-xl2hzzZ5GEMuxpCyQc1MOqyCjrL6AEXuB5JgTvFJYCEz9EjIIBL_2u-7NoXgK9g_nY9goVGu3toaOqPefLcBRVuzBrchzyrY6uIJcV0q1eth6JT6wX_l4dTR7OsCefE0WHwGtbV_NRoe3VqZl0_YIL2hsFJ_3aUvm--yz7C7cW3GRjbcOz9WvJIx3zaRSkQfCaat8MlwUFZQjtKoMPPlkUqg", "payload": "" } 2024-11-20 17:48:19,339:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776191227 HTTP/1.1" 200 804 2024-11-20 17:48:19,340:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:48:13 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrZBqhSm64D2TS-7v6cDdmTP0MCnyeh3smd9tHVXmgtO4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:28Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/vZq3rg", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/Hvp1ig", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/tag9BQ", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" } ] } 2024-11-20 17:48:19,340:DEBUG:acme.client:Storing nonce: JNlwFRqrZBqhSm64D2TS-7v6cDdmTP0MCnyeh3smd9tHVXmgtO4 2024-11-20 17:48:19,341:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:48:19,341:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-11-20 17:48:19,342:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:48:19,342:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:48:19,343:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:48:19,343:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:48:19,344:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:48:19,344:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:48:19,345:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:48:19,403:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-20 17:48:19,691:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:48:19,692:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-20 17:48:19,693:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-20 17:48:19,700:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:47 UTC. 2024-11-20 17:48:19,700:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:48:19,700:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:48:19,706:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:48:19,706:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:48:19,706:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:48:19,712:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:48:19,713:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:48:19,716:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:48:20,179:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:48:20,180:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:48:14 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "a0rxX_TFFUc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-20 17:48:20,180:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:48:27,710:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8727_key-certbot.pem 2024-11-20 17:48:35,155:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8725_csr-certbot.pem 2024-11-20 17:48:35,156:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:48:35,156:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:48:35,312:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:48:35,313:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:48:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXz-Pz1d7DfaRBenbd4sPcK4rXP4J4h8EaFk8fiGPGtms X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:48:35,314:DEBUG:acme.client:Storing nonce: usf-jMgXz-Pz1d7DfaRBenbd4sPcK4rXP4J4h8EaFk8fiGPGtms 2024-11-20 17:48:35,314:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:48:35,321:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1h6LVB6MWQ3RGZhUkJlbmJkNHNQY0s0clhQNEo0aDhFYUZrOGZpR1BHdG1zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YPru-V_SC1Pq_a_CP7HMAX1lxy7tFyQstW4QnKgnBAgYJPYjWdag_63Xyt7TAFCyuYiQ8zhH9wkc2Mdb0dulNwSbpx6GO7fUMpZeYNii8bzlp9NvWIpsWvBZSdOWZ6nBHZjmMvojBpmxwOnNgNFGVYP4kwhr7cqh1YbkvahKDVifL3gNJYNVxQRVlyq3bmW8YQwajldsxlJa3-ohzlHGv-ILbDEC8WikoKW6p7phsQoJhMN0K-uFZnxdEeL2vUGV7dnz0tFvzk496mi1RD4tbYXVCvoXE8dx2UdbsUFB3AyctNwlMd0YuX5FyGvIP-5IClyfyE4ky_m7dfZlozHpmA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-20 17:48:35,519:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-20 17:48:35,519:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:48:30 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864075277 Replay-Nonce: JNlwFRqrnPA15s0iTlnN_oAeCCq1XXS6ClXf8tklzRH4FRNiFBI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:41Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864075277" } 2024-11-20 17:48:35,520:DEBUG:acme.client:Storing nonce: JNlwFRqrnPA15s0iTlnN_oAeCCq1XXS6ClXf8tklzRH4FRNiFBI 2024-11-20 17:48:35,520:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:48:35,526:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJuUEExNXMwaVRsbk5fb0FlQ0NxMVhYUzZDbFhmOHRrbHpSSDRGUk5pRkJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYzMDkzMTcifQ", "signature": "cRPITiSsrSppklpYrHk5ifCEfBkEvQa3uA2f1V2W7DOW_KEhgyhJmFhPlDUk--lTokplvWX2Qq6YRMVPt_zYOiODVpQIMnpAy-XUfgGtVpcCJhYuNg-zqdkSaHdxBRitkVxfRNSebEFr7Sotcz3V7yXFvQnopMEzMsacf5Hmtcd-dk_onL_WXrHlmvM3S8vOBD50ehhQT4UCOg_9myGYyronn38wZ_yu7hqWXuzB_ZyFdS4AqV4ZSRCYZTRHjxb-daEl0IbA6QVufgEfs_HZS3ukpVJ7VgMAaxmO7OSlcMufpZAvfdTDHnNrj5b7sjoletsY0Tg-_oaEZSHDhrWT5A", "payload": "" } 2024-11-20 17:48:35,703:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776309317 HTTP/1.1" 200 807 2024-11-20 17:48:35,704:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:48:30 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXPG3dDXMMz2ZhxyLerPyfX1b5NfAVgT5OuU7FikA3YyE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:41Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/RhhX0A", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/8Wvihw", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/9T0aKw", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" } ] } 2024-11-20 17:48:35,705:DEBUG:acme.client:Storing nonce: usf-jMgXPG3dDXMMz2ZhxyLerPyfX1b5NfAVgT5OuU7FikA3YyE 2024-11-20 17:48:35,706:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:48:35,706:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-11-20 17:48:35,706:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:48:35,707:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:48:35,707:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:48:35,708:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:48:35,708:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:48:35,708:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:48:35,710:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:48:35,796:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-20 17:48:36,034:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:48:36,036:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-11-20 17:48:36,037:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-11-20 17:48:36,043:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-11-20 17:48:36,047:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:48:36,109:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-20 17:48:36,330:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:48:36,332:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-20 17:48:36,332:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-20 17:48:36,339:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:08 UTC. 2024-11-20 17:48:36,339:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:48:36,340:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:48:36,347:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:48:36,348:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:48:36,348:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:48:36,354:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:48:36,355:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:48:36,357:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:48:36,835:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:48:36,836:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:48:31 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "X2mGayGOHK4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-20 17:48:36,837:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:48:44,534:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8728_key-certbot.pem 2024-11-20 17:48:51,993:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8726_csr-certbot.pem 2024-11-20 17:48:51,994:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:48:51,994:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:48:52,158:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:48:52,160:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:48:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxIkWcKrQ7kJYfnKfHE_FP__uaLQJCLux14ASbyBGLzu8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:48:52,160:DEBUG:acme.client:Storing nonce: nHAuMvoxIkWcKrQ7kJYfnKfHE_FP__uaLQJCLux14ASbyBGLzu8 2024-11-20 17:48:52,160:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:48:52,168:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3hJa1djS3JRN2tKWWZuS2ZIRV9GUF9fdWFMUUpDTHV4MTRBU2J5QkdMenU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "h1qqE5wukYIwaI56X7VSmg35c8ziSb5uwSSKFf9qusOb_M4ZZ3ZgXtuKO9pHRx_x7G8XP7IsMhPGgwXf03TDVgnGQ9dyeBFC0YR99gkWZsSe6zwa2a0NGr6gC1w0Ufk23Kx8JDeUyzQRpyANpMrlGQdu8qynvgceJFKf6RRDZtjpUOeJ4AguLWFYqtBm5l92t_zPRqKirMw6u8GDOYYnu8cy-9AxoOkhvIaDLMTvDoEvnylAl8DaO9cJN8-TH_cr56WznhVnWIANOfPmGaBSU5g7_D1QCjSPtgrTOFkF779Ooz9HVN58-JMjuRLDlbadJQCjqHgqhsqRGsqi52YSXQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-20 17:48:52,346:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-11-20 17:48:52,346:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:48:46 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864158237 Replay-Nonce: q3AS6Q6nfIIJeFv50GnsQMHPKyOh1gvvN7dpf67WSaTNwNAQVhA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:54Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864158237" } 2024-11-20 17:48:52,347:DEBUG:acme.client:Storing nonce: q3AS6Q6nfIIJeFv50GnsQMHPKyOh1gvvN7dpf67WSaTNwNAQVhA 2024-11-20 17:48:52,347:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:48:52,355:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5mSUlKZUZ2NTBHbnNRTUhQS3lPaDFndnZON2RwZjY3V1NhVE53TkFRVmhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY0MzIxMDcifQ", "signature": "RwXgJKg4hXBYiowHaThOuAso-MBkyFaKRnL_MLNznyytm9rCQh55yx1oeaMGGNF-9xnC337MzQ8j6CDtp38nm5T9Cwd5YghFFtt0c3w009KoEhtI5u8VCgC36mhgMc8gy3cP5FJQ6H0DA4e1pxAvrUlvtYzS35GbIbsigR9rxkgEoNS7tsx1_QnhTs19yiUU3nqtHFn-USb-xM6_BQoxH9ix0F4a9Jj6hh3wnp4EpRQBNq3Nu82aTZEPnaC6RL2Dr2Nrogs2ndq4j9CuHFKV6d-J7rhTDSZhRYnMvJOjAhelUX1mLqUYd2mk4399FMrG8wIA64Xwu4rA1PU4dtgjWw", "payload": "" } 2024-11-20 17:48:52,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776432107 HTTP/1.1" 200 801 2024-11-20 17:48:52,520:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:48:47 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxrWaqgQvsvpGgcaiS4iuMdithGC0WskgP8w4LoDyHXUo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:54Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/Wk_i8A", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/iWIilA", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/U1YmAg", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" } ] } 2024-11-20 17:48:52,520:DEBUG:acme.client:Storing nonce: nHAuMvoxrWaqgQvsvpGgcaiS4iuMdithGC0WskgP8w4LoDyHXUo 2024-11-20 17:48:52,522:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:48:52,522:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-11-20 17:48:52,523:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:48:52,523:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:48:52,524:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:48:52,524:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:48:52,525:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:48:52,525:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:48:52,527:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:48:52,575:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-20 17:48:52,770:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:48:52,772:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-20 17:48:52,773:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-20 17:48:52,780:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:27 UTC. 2024-11-20 17:48:52,780:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:48:52,781:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:48:52,788:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:48:52,789:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:48:52,789:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:48:52,796:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:48:52,797:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:48:52,800:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:48:53,287:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:48:53,288:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:48:47 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "109hmzC1-ug": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-20 17:48:53,288:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:49:01,047:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8729_key-certbot.pem 2024-11-20 17:49:08,336:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8727_csr-certbot.pem 2024-11-20 17:49:08,336:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:49:08,337:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:49:08,504:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:49:08,505:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:49:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxZFIt9ivdDWIe9RbTLkdlWqTV271Ok3B4tNVl-sspkDU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:49:08,505:DEBUG:acme.client:Storing nonce: nHAuMvoxZFIt9ivdDWIe9RbTLkdlWqTV271Ok3B4tNVl-sspkDU 2024-11-20 17:49:08,505:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:49:08,512:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3haRkl0OWl2ZERXSWU5UmJUTGtkbFdxVFYyNzFPazNCNHROVmwtc3Nwa0RVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XrNlfWVHi_uzpIx33XRJKqVE9n48146qoevhpMwzStyJn9EOQMZqpvjn94RCSnQPCi-Cn3f-x_-l7UBbpeCLMowJfAuI0AGEub96Ql1v4jGUSDd9TJHjEpCIsZ17l_bsyK0WV9zc6CqkCL7WkisGSJbfqXNrC795rxmF84nXxFBT1pmUhkqZGMXfKdBp-mH7iVmYm_JA8Je64vbec7id76ReBBDiAbJbbw5IuGP1P_R3SxjYK9F5fTQpdVjumLXO4CEeY41l6GTHXN6CULb8EAaSxL7M4PQBc6v0JDd4hUIZtbVFgSm_PFwgWZpsPS9txiPLhdSEbrkEja4gx2JjwA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-20 17:49:08,734:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-20 17:49:08,735:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:49:03 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864248527 Replay-Nonce: nHAuMvoxU9N3zvUW9qpCXER2cvK8kPYNXcQJYugZOjqod8roPrw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:07Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864248527" } 2024-11-20 17:49:08,736:DEBUG:acme.client:Storing nonce: nHAuMvoxU9N3zvUW9qpCXER2cvK8kPYNXcQJYugZOjqod8roPrw 2024-11-20 17:49:08,736:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:49:08,744:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3hVOU4zenZVVzlxcENYRVIyY3ZLOGtQWU5YY1FKWXVnWk9qcW9kOHJvUHJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY1NjE2NzcifQ", "signature": "cJ2jOrkvyiUJcAY49EQCBddgP_EFhI-TSwM8i4kRmMn9RqXWuBWfVg-N_2fvukO0bV9nmbCo_pPtLq1EXvSn9oM2Fdj7GmCYLlVdms_bG_K-kjKHFe8jZq7TTBnWBXFn-hMDEZj0qZnTn1rs-eQCjePJ4K_sppsOqJXIfSqZ-ltW11tSS6-D_NU67Yk1Y4amrnQw8p_AMXQd_ry06nbhDMqk0mDOGOJLOUgIuB24Ng-xEN8jhQpBE8qL7eTnsaJx-0cQeQB6QC5kgqHaiCehXZePKuAWWvMgowAA0jDp2OhiyL0eGMKOkCwzHBmGpTvmH060Y9-qjPwqTnlPnpLw2A", "payload": "" } 2024-11-20 17:49:08,916:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776561677 HTTP/1.1" 200 805 2024-11-20 17:49:08,917:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:49:03 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvox4zO4xDbZOhDKa8ZEtj0vpet5K89EBzQm261XEF4qQzY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:07Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/kvNskw", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/S4Po3g", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/QOkASw", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" } ] } 2024-11-20 17:49:08,917:DEBUG:acme.client:Storing nonce: nHAuMvox4zO4xDbZOhDKa8ZEtj0vpet5K89EBzQm261XEF4qQzY 2024-11-20 17:49:08,917:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:49:08,918:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-11-20 17:49:08,919:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:49:08,919:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:49:08,920:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:49:08,920:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:49:08,920:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:49:08,920:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:49:08,922:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:49:08,970:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-20 17:49:09,164:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:49:09,165:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-20 17:49:09,166:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-20 17:49:09,173:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:58 UTC. 2024-11-20 17:49:09,173:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:49:09,174:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:49:09,178:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:49:09,179:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:49:09,179:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:49:09,185:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:49:09,186:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:49:09,189:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:49:09,651:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:49:09,652:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:49:04 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "vzyqalrvvPw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-20 17:49:09,653:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:49:17,278:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8730_key-certbot.pem 2024-11-20 17:49:25,611:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8728_csr-certbot.pem 2024-11-20 17:49:25,612:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:49:25,613:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:49:25,769:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:49:25,769:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:49:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXZ1WxUHcQYLSkrO8bz5PVzYR1c_hxksr7KerYZm9_58E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:49:25,770:DEBUG:acme.client:Storing nonce: usf-jMgXZ1WxUHcQYLSkrO8bz5PVzYR1c_hxksr7KerYZm9_58E 2024-11-20 17:49:25,770:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:49:25,778:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1haMVd4VUhjUVlMU2tyTzhiejVQVnpZUjFjX2h4a3NyN0tlcllabTlfNThFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ypVwcX3iHxiEdGrNLeYDj3wzZ5_gUfvsIqBfW2fNHZKltAs6F8tP2szPMLI9FzI9JWE1yll4i6919rFW19ArXafm21J_yOP643Ai2MsmIgLzdTb3KSC39emg4cwZiZ2CEsdB_wbxEYnp-hRHNQQWlWCCVaF4KLJhZvsGDopvOSeocyJICG7BHt0YTcy9DoCH84ILX8bDqJ0173LMwu4atnRSQpTFu46YKHDbpq1bOW9V0bhy7sY7dYA27MDGN31MrDTEQQOvkTbdYsAMGJfTWh2hV0Ta42gRAtH-EP_qkv2gYbZCYZcu_Kz_AHuaomCy-cISzc_ZoAJLQtXGyesRAA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-20 17:49:25,987:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-11-20 17:49:25,988:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:49:20 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864332297 Replay-Nonce: usf-jMgXOxPTHn1PCBzn7nrTf9Gp18ZeFFyGlnUCm6iKLZ78eSA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:20Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864332297" } 2024-11-20 17:49:25,989:DEBUG:acme.client:Storing nonce: usf-jMgXOxPTHn1PCBzn7nrTf9Gp18ZeFFyGlnUCm6iKLZ78eSA 2024-11-20 17:49:25,989:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:49:25,996:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hPeFBUSG4xUENCem43bnJUZjlHcDE4WmVGRnlHbG5VQ202aUtMWjc4ZVNBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY2ODU2NTcifQ", "signature": "sK3BlbpU07QDcx3v9qSphasrvG8T0R2pOV2Ng5fA1KdP8CCfBm3FyBcWickDaNoisp4dV9QgpaGlBwT52ZZQ2Z4-OL0QYWJYGzBFkb4azLUtLRFBCX0cH9xuvBgdikB7w_x2TcGfxDzUI3jejVrjSyBLBTVCU0ijUDWWH5vXz6QutU0AhxFeZaTm9fIpRnBhueJJ2YacDGLxR0FtHCTwaCOwd_jnB1ejrRLNjJXWEtfBLxqOQ0YSF4MDgiCgiSUPhnJfYaAux2zc4E87fUx9C9WE77ypbmYH1KxztaaC0aF4ZMexKv-zucpgK_ltPAKGowhNqUgMKhMEUbs-SeYOPQ", "payload": "" } 2024-11-20 17:49:26,158:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776685657 HTTP/1.1" 200 809 2024-11-20 17:49:26,159:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:49:20 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXcLALy3ndXcsag19dCk11xtIzryhpreNWRgwrJsUu63I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:20Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/BBENhw", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/DgbGnw", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/s3nu5w", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" } ] } 2024-11-20 17:49:26,159:DEBUG:acme.client:Storing nonce: usf-jMgXcLALy3ndXcsag19dCk11xtIzryhpreNWRgwrJsUu63I 2024-11-20 17:49:26,162:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:49:26,163:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-11-20 17:49:26,163:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:49:26,163:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:49:26,164:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:49:26,164:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:49:26,165:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:49:26,165:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:49:26,168:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:49:26,218:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-20 17:49:26,466:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:49:26,467:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2024-11-20 17:49:26,468:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2024-11-20 17:49:26,473:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:15 UTC. 2024-11-20 17:49:26,473:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:49:26,474:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:49:26,481:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:49:26,481:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:49:26,482:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:49:26,498:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:49:26,499:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:49:26,502:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:49:26,945:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:49:26,945:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:49:21 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-nce0QaYd1M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-20 17:49:26,946:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:49:35,708:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8731_key-certbot.pem 2024-11-20 17:49:43,878:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8729_csr-certbot.pem 2024-11-20 17:49:43,879:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:49:43,879:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:49:44,028:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:49:44,029:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:49:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXOd63WvHycgROgAB39D-jDgEFm6IbmTEKEdEze3JJ-i0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:49:44,029:DEBUG:acme.client:Storing nonce: usf-jMgXOd63WvHycgROgAB39D-jDgEFm6IbmTEKEdEze3JJ-i0 2024-11-20 17:49:44,029:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:49:44,036:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hPZDYzV3ZIeWNnUk9nQUIzOUQtakRnRUZtNklibVRFS0VkRXplM0pKLWkwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "d4hIl4KIZ8A222clvKn1HW67OHO_om7m4Xdx_WxnCX8nLYyPF5nJEr3Ig52APKyzc-TGB-hXgRS-mu5zuKZcDz9PeK8Iw7heRjfpqKCrm6-UIPEwWFPY4Ml5X7dZDATwdDiqZ6FfMsqezLMxYiozZaTmkN9APKExul1-ZKtCt74-wcsEQiP76k5xMddMWs3FfqdpsKOIDWoGoGTCAFn7TswsThtI1z_aCe_iRuE8Hv3lg9fJBDh0-ZtuCjaUNIxYPSL0u3DzxGrQKm4DJ41-aNa-7dt262UC9IR--Ma37Q8HtF71KuPXoSbEAlLMfkkQsYJmu4DSzeZI1-uC0praMQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-20 17:49:44,229:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-20 17:49:44,230:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:49:38 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864408807 Replay-Nonce: usf-jMgX7RFWFf8abURM-qxzrffRV17y3hUHmnfZKuUkiQeSzpE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:33Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864408807" } 2024-11-20 17:49:44,230:DEBUG:acme.client:Storing nonce: usf-jMgX7RFWFf8abURM-qxzrffRV17y3hUHmnfZKuUkiQeSzpE 2024-11-20 17:49:44,231:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:49:44,238:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1g3UkZXRmY4YWJVUk0tcXh6cmZmUlYxN3kzaFVIbW5mWkt1VWtpUWVTenBFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY4MDA1MjcifQ", "signature": "CLnA2oEHd5A5P1_bme8c36qS-HAGg3DPLjlO3_PT8bukJaExaRc_wHNf36O3z3PSrpwDno21ePf0GWV42v8oVgYRssl1ZSm071nO1fH-nP7_Sopw-6hEbj_Es_0iN46N3yE2CHLfkQRnfxq_761PiccR76FVLHdwPaGnwd_fBWbpbeiGjxSk6s_U5RndZJ39ZkgVnYI4LcOol9eK7jiRPGfeAQdvH_HLetxqYtrAsoDC666nVgURd_IEmuXYNXw30KJHJLh1pNMsDgutDMdacKSOEm3YsUk44bcURBKB4dM2TJVV0DWbWmnhCoCGppi9-JDQuE_hAAYYIK5Qqp2YqQ", "payload": "" } 2024-11-20 17:49:44,397:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776800527 HTTP/1.1" 200 807 2024-11-20 17:49:44,398:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:49:38 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgX8vy3lhZgtP_qYZ8MogfkfopDqLNoZL3UNn8_Xf9nt1o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:33Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/B8BcEw", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/yjXnZA", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/uHoKaA", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" } ] } 2024-11-20 17:49:44,398:DEBUG:acme.client:Storing nonce: usf-jMgX8vy3lhZgtP_qYZ8MogfkfopDqLNoZL3UNn8_Xf9nt1o 2024-11-20 17:49:44,401:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:49:44,401:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-11-20 17:49:44,402:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:49:44,402:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:49:44,403:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:49:44,403:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:49:44,404:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:49:44,404:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:49:44,406:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:49:44,454:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-20 17:49:44,629:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:49:44,630:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-20 17:49:44,631:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-20 17:49:44,637:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:37 UTC. 2024-11-20 17:49:44,638:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:49:44,638:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:49:44,644:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:49:44,644:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:49:44,645:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:49:44,651:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:49:44,653:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:49:44,655:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:49:45,139:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:49:45,140:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:49:39 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NZ7Dj1sm9nk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-20 17:49:45,140:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:49:53,797:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8732_key-certbot.pem 2024-11-20 17:50:02,096:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8730_csr-certbot.pem 2024-11-20 17:50:02,097:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:50:02,097:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:50:02,260:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:50:02,261:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:49:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvox8jJYPXqtVy7rb6WfeVm18oSVDfqq5UIHid5t6Yf5T-I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:50:02,261:DEBUG:acme.client:Storing nonce: nHAuMvox8jJYPXqtVy7rb6WfeVm18oSVDfqq5UIHid5t6Yf5T-I 2024-11-20 17:50:02,261:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:50:02,268:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3g4akpZUFhxdFZ5N3JiNldmZVZtMThvU1ZEZnFxNVVJSGlkNXQ2WWY1VC1JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xGA_7-dCVn_SrEuXR0rErhrw5nqJ-xuQEseDdYyjnXU-9ffs3skyR2tPyc961TJ6qMTSa1w8pzximWBZotagglQx4tY8k-H3gWM9ssoaEOmO6LTXzfBj7XeuWMTqnshg6ptlJUxRGoTfxkqwK5ohmflYW_WU2Hvr6U9vlbeP6NDK_oUVZImE23SwuJQGL3qskP2y5BYgy27XySDbVavGz3vL_16WJ-sTr57VZNXEKFa72mbGyfA8dGV9ujjypEWS4KqMC5mp4PDBQOP6pRm1GSql75Hrnc1P8TP1Oj90g62fI10RU0EdDgKg7paYnMhuyiO4go0YT0rWCwOVhJKzXw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-20 17:50:02,446:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-11-20 17:50:02,447:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:49:56 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864481367 Replay-Nonce: nHAuMvoxRbYx7sxkNJN52hwHowyZ_ixPHtZxK3H831-c48eJZaY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:46Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864481367" } 2024-11-20 17:50:02,447:DEBUG:acme.client:Storing nonce: nHAuMvoxRbYx7sxkNJN52hwHowyZ_ixPHtZxK3H831-c48eJZaY 2024-11-20 17:50:02,448:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:50:02,455:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3hSYll4N3N4a05KTjUyaHdIb3d5Wl9peFBIdFp4SzNIODMxLWM0OGVKWmFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY5MDgyNjcifQ", "signature": "C-XEPuumTYo3jz3Sz4vczQ7dPAHHUb9MTS0RYuNM1jiLK7cqRgRIeYfbT2pHQr1fWTKp3nISBiu2HnAJb_zrwoLmvcOV1QPR2jBz8d_4f3sP7K8ECW6GNb7c0lEmWwR1InNh3SZlSqT_giUxl0jz29rh3BLZ3-4UtIZNkYFbZR31YKin2lcWXK7o8rCackMwRBk237ZIuu7GH-9iZjVhIGDSzy_qTewW0vWkJgTmmvgJGU0MqG8XgDjtQSZxzsHLfY2BG06Jcqidjue3VzcWRIi7LKiaYgye3ZSXyXiZznCrwEBaVXGv3Ky_TSDNtFXHJI6djFp7kzXs5LPj2bjZUw", "payload": "" } 2024-11-20 17:50:02,623:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776908267 HTTP/1.1" 200 806 2024-11-20 17:50:02,624:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:49:57 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxXPKR29CHl0Na3hu0MlmPDS7npphvEh9SjA1nH6Qay0w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:46Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/pzyROQ", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/tMqdPg", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/PhZSOw", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" } ] } 2024-11-20 17:50:02,624:DEBUG:acme.client:Storing nonce: nHAuMvoxXPKR29CHl0Na3hu0MlmPDS7npphvEh9SjA1nH6Qay0w 2024-11-20 17:50:02,626:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:50:02,627:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-11-20 17:50:02,627:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:50:02,628:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:50:02,629:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:50:02,629:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:50:02,629:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:50:02,630:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:50:02,631:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:50:02,693:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-11-20 17:50:02,693:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:50:02,694:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-11-20 17:50:02,702:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-11-20 17:50:02,705:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-11-20 17:50:02,706:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-11-20 17:50:02,706:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-20 17:50:02,706:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-11-20 17:50:02,709:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-20 17:50:02,765:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-20 17:50:02,962:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:50:02,964:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-20 17:50:02,965:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-20 17:50:02,971:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:56 UTC. 2024-11-20 17:50:02,971:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:50:02,972:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:50:02,978:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:50:02,978:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:50:02,978:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:50:02,984:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:50:02,986:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:50:02,988:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:50:03,440:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:50:03,441:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:49:57 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "kD8-UVwER18": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-20 17:50:03,442:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:50:11,685:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8733_key-certbot.pem 2024-11-20 17:50:19,872:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8731_csr-certbot.pem 2024-11-20 17:50:19,873:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:50:19,873:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:50:20,025:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:50:20,025:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:50:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrHttHPzBilL3YODJG0b83-B_yqH5RvTCAvIxXkaELfLw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:50:20,026:DEBUG:acme.client:Storing nonce: JNlwFRqrHttHPzBilL3YODJG0b83-B_yqH5RvTCAvIxXkaELfLw 2024-11-20 17:50:20,026:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:50:20,032:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJIdHRIUHpCaWxMM1lPREpHMGI4My1CX3lxSDVSdlRDQXZJeFhrYUVMZkx3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "i4aPv3LemZ0n17EjAxgvBMHVmls_0GOac0DxNEBcvW1WIUN5gpHlTGtrD6aedt20VcwqBk0cFrh7gpM1DG-Ldc0wfFGpYlUtv16YL3HgXnKmVEst7HePfjGny7J79vv7EQ26v7G7AwyEz6xIx2lRsxPe0nvlWzAE2BYhxPZQkjINYiU9DJtrdoD94qVrn-_utFlQtFL1bdqca8xPKz_vJL2vSSuHySzce92NdEWxcM0PGwJryxsao1EOr3BfpOBD3HWxcKLgkvADfihzAcjyAkJEA279m3zmKrSQ3b-UXcc48rCWH3v2PRvMRzc2bB0IYxp-hZPCGePzUSMpilNUIA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-20 17:50:20,231:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-20 17:50:20,232:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:50:14 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864554417 Replay-Nonce: JNlwFRqrvYMfcLbEYSWObEhpifaWjxGSQSspyHZUoTkoRnaWEb4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:59Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864554417" } 2024-11-20 17:50:20,233:DEBUG:acme.client:Storing nonce: JNlwFRqrvYMfcLbEYSWObEhpifaWjxGSQSspyHZUoTkoRnaWEb4 2024-11-20 17:50:20,233:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:50:20,239:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJ2WU1mY0xiRVlTV09iRWhwaWZhV2p4R1NRU3NweUhaVW9Ua29SbmFXRWI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcwMTY3OTcifQ", "signature": "jfw_T4zUMALGOHBsU7rF_aaNDQ3XO_uMVd24zPS7fTa3jAgd3U0b1Hx5SansAocjICvrsIPHrca3BOuQsnM1rpSpsn7eW6nsqcJPkceSJwOBVaHJz6zDyr9w4-YxJevlqktGEl-v9z4ZN482CZg8Ab5xSU6eRAfJf422Eum1pxtMlYqQmHcRPtBEAqP75rWVHniRtypUqe9IM_nyb7ORcCj9dT160M31dTGem6YHUBodOvyttTceZRpdh_BO-_krBZQI6ppFCw8kgBxSouqJ7om3fCe0SmhlTTgSfacZ96LhIxlwYGEq36FN_AoqyChbyU859cjO4LYFmD92_hXZbA", "payload": "" } 2024-11-20 17:50:20,403:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777016797 HTTP/1.1" 200 811 2024-11-20 17:50:20,404:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:50:14 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrRv5J2Wvnl8BjKpwTSt6Wgl-se8fm98vmrb8nRInvwrk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:59Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/tKio5w", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/C4H6lQ", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/uNkVbw", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" } ] } 2024-11-20 17:50:20,404:DEBUG:acme.client:Storing nonce: JNlwFRqrRv5J2Wvnl8BjKpwTSt6Wgl-se8fm98vmrb8nRInvwrk 2024-11-20 17:50:20,405:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:50:20,405:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-11-20 17:50:20,406:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:50:20,407:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:50:20,408:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:50:20,408:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:50:20,408:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:50:20,409:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:50:20,409:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:50:20,468:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-20 17:50:20,649:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:50:20,651:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-20 17:50:20,651:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-20 17:50:20,657:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:15 UTC. 2024-11-20 17:50:20,657:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:50:20,657:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:50:20,665:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:50:20,665:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:50:20,666:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:50:20,687:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:50:20,688:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:50:20,689:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:50:21,174:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:50:21,175:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:50:15 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "k-suhuFYmMQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-20 17:50:21,175:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:50:30,225:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8734_key-certbot.pem 2024-11-20 17:50:38,000:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8732_csr-certbot.pem 2024-11-20 17:50:38,001:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:50:38,001:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:50:38,163:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:50:38,164:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:50:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxWRXA6LUEdQpoRDFJOEijCrJEKypEeAD0C_OVTmdWcJc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:50:38,164:DEBUG:acme.client:Storing nonce: nHAuMvoxWRXA6LUEdQpoRDFJOEijCrJEKypEeAD0C_OVTmdWcJc 2024-11-20 17:50:38,164:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:50:38,174:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3hXUlhBNkxVRWRRcG9SREZKT0VpakNySkVLeXBFZUFEMENfT1ZUbWRXY0pjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qQeDpUz-ABjo8cwBjcg_rgT1DUO6LCaw3zhXVxE_mgYNBgVWFLMCuBgrY4C26Jkbr5MNfZpND8dqzOunqqHK9ern3a40qZhqkKq0XY1j4Baq1Be9JtN-IaR18G_htuHqzuef5tY1_WN9RBb0swmIgyTiaUHX_7igY1rP-CU9KJp4mrCp9N7JBrEpBvB2_tA1sDx9TOjJ55qbrXgMeF14Q-Be6RJ69qu8OmEiJ91vvj3q-UlV0PfCbuiIIe57EbtSnxisvpgsc8rJ_EXvbxkVD_UN7KcNGSH7Tb8pgbjLWPcP51scCInp_lMRxan8e2Vj9AI7XquKkiV4okEUv09SKQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-20 17:50:38,377:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-20 17:50:38,377:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:50:32 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864646067 Replay-Nonce: q3AS6Q6n-nFvEjrQqu_Ed1XzVPY2kLxjm_eMPAPyWtrpdtKZ-Kg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:12Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864646067" } 2024-11-20 17:50:38,378:DEBUG:acme.client:Storing nonce: q3AS6Q6n-nFvEjrQqu_Ed1XzVPY2kLxjm_eMPAPyWtrpdtKZ-Kg 2024-11-20 17:50:38,378:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:50:38,385:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm4tbkZ2RWpyUXF1X0VkMVh6VlBZMmtMeGptX2VNUEFQeVd0cnBkdEtaLUtnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcxNDM2NjcifQ", "signature": "FeEbkb4Wd8q8AboqWSkUgzVv-VcNRHwE3ZBJwETGsJxQyR7QVlPI-toTMj9kXnVRT1_DYNXdXcexKcykcKPBUfbnVRnH_AQUtmnOz4gM6Oym_KqSwIqf-7_72YzgoAy8hEUwDts8q5CP7ITnxIsN1Sdjewgo6KCK91cga37sFMNFGPjj4GPnrwbuvuEaZAq4b0n66zZuQ5_VyzF5CymzUXgzP6A6-yQgpCo6EApdibWfjv-HT-Zf1viChBX_qP_lzKJfwtsxmPODgYiyLUTd95poQX9OAXczWdwIxGYLb_nkrnCmjHh1nQn53As3aQWKg42eNi42axL2qm1l9luh3Q", "payload": "" } 2024-11-20 17:50:38,552:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777143667 HTTP/1.1" 200 810 2024-11-20 17:50:38,553:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:50:33 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxdHIFWMiTL-NfNrut4cwrTc7Eo5QdJMvA15ujWtII9U0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:12Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/I07SEw", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/Ttq2kg", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/9bNT8Q", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" } ] } 2024-11-20 17:50:38,553:DEBUG:acme.client:Storing nonce: nHAuMvoxdHIFWMiTL-NfNrut4cwrTc7Eo5QdJMvA15ujWtII9U0 2024-11-20 17:50:38,554:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:50:38,554:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-11-20 17:50:38,555:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:50:38,556:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:50:38,557:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:50:38,557:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:50:38,557:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:50:38,558:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:50:38,559:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:50:38,608:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-20 17:50:38,969:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:50:38,970:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-11-20 17:50:38,971:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-11-20 17:50:38,976:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:32 UTC. 2024-11-20 17:50:38,977:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:50:38,977:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:50:38,983:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:50:38,984:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:50:38,984:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:50:38,990:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:50:38,991:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:50:38,993:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:50:39,458:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:50:39,459:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:50:33 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "vfTeTYI5sXU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-20 17:50:39,460:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:50:46,948:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8735_key-certbot.pem 2024-11-20 17:50:54,859:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8733_csr-certbot.pem 2024-11-20 17:50:54,860:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:50:54,860:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:50:55,013:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:50:55,013:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:50:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrUW9xAoXn7OiCOnKXVlS7C95NBPaTQGbwUdwSpp7A49w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:50:55,014:DEBUG:acme.client:Storing nonce: JNlwFRqrUW9xAoXn7OiCOnKXVlS7C95NBPaTQGbwUdwSpp7A49w 2024-11-20 17:50:55,014:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:50:55,022:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJVVzl4QW9YbjdPaUNPbktYVmxTN0M5NU5CUGFUUUdid1Vkd1NwcDdBNDl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Yls1b5N2ATWBdsq6msH_CiIrvIYhVGvvdhKBrRbgioLjLKpqBQTMRYcjN9SsTHgQEosMV8iNw1SZgrDfsF0halhH3ZMNW8qPxldjttiqEBvf5lcvbA1mVWf8_LRm3MeL2zQvUYJPs1Y-wenJgg409IpaOB1HXDFMCEXRKKUYwqCzx2JLKKelwCDRcgkNOJD9d_bywqapR3rh7d6T6vpXZ6Oh7kZAUkveFXpbFmRRS8TtohdU0Nlobw3gnfMWHOkkzNOFqpQe70dhUKMZFCU_vguK3e_xfA2IW3xmX4oxKaG66BfqHbXwhk7t0RKv4I_NWXRbtVoTF4lRIFiEEXtnrg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-20 17:50:55,213:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-11-20 17:50:55,214:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:50:49 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864723967 Replay-Nonce: JNlwFRqrLrykSIHSQ4DMZo4yAlNtf-oqEdfXtYaP2fM9bb8xTT8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:25Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864723967" } 2024-11-20 17:50:55,214:DEBUG:acme.client:Storing nonce: JNlwFRqrLrykSIHSQ4DMZo4yAlNtf-oqEdfXtYaP2fM9bb8xTT8 2024-11-20 17:50:55,215:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:50:55,222:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJMcnlrU0lIU1E0RE1abzR5QWxOdGYtb3FFZGZYdFlhUDJmTTliYjh4VFQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcyNTgyNzcifQ", "signature": "GKqIA6n8ebWCXrOnQvV0IqYI4nT_YzkhIJnCkdN8DfS8S4dBHX-pFNO4WHeNnxc3C00xJBwc1OtEFUnzwYlZ-dYOy4VqS6LN8g3tMCWnqJB-tmYNdHXabJjkH0YX8b4Yft0T86fSnI92WKyB8eqVRLgKRSc2zhLTcmSFTfkSlvF_ywNcYET3_EB2xTi_iTnkl9iTyBV837s6GTxlcv92ijXy-VC1E3kQ_noOTgrqYcUTb8darZRZEucOxKcp9UCRWH-v3oAOtVwwyoC3kHKl5YuL3UPNbY_cKbA9boED9FDG4po6B661t7yNmm6LZnCi8WKNU2T2icWITpUBxMSgGw", "payload": "" } 2024-11-20 17:50:55,398:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777258277 HTTP/1.1" 200 809 2024-11-20 17:50:55,399:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:50:49 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrOe4lzTACu8R7J0fverYKuVaf_k_BWmZLWVausYVsBEM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:25Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/GfFFvQ", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/dLzeEg", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/cBbQvQ", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" } ] } 2024-11-20 17:50:55,399:DEBUG:acme.client:Storing nonce: JNlwFRqrOe4lzTACu8R7J0fverYKuVaf_k_BWmZLWVausYVsBEM 2024-11-20 17:50:55,400:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:50:55,400:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-11-20 17:50:55,400:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:50:55,401:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:50:55,402:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:50:55,402:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:50:55,402:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:50:55,403:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:50:55,404:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:50:55,466:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-20 17:50:55,728:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:50:55,730:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-11-20 17:50:55,731:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-11-20 17:50:55,735:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:52 UTC. 2024-11-20 17:50:55,736:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:50:55,736:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:50:55,743:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:50:55,743:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:50:55,744:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:50:55,750:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:50:55,751:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:50:55,754:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:50:56,243:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:50:56,244:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:50:50 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "RgMk3AOuLx4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-20 17:50:56,245:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:51:04,004:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8736_key-certbot.pem 2024-11-20 17:51:11,404:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8734_csr-certbot.pem 2024-11-20 17:51:11,404:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:51:11,405:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:51:11,567:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:51:11,568:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:51:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nLrYf-tYyyMyo06qeZK1gpGjrJwHVWQBIontsc8-VQes X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:51:11,568:DEBUG:acme.client:Storing nonce: q3AS6Q6nLrYf-tYyyMyo06qeZK1gpGjrJwHVWQBIontsc8-VQes 2024-11-20 17:51:11,569:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:51:11,576:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5McllmLXRZeXlNeW8wNnFlWksxZ3BHanJKd0hWV1FCSW9udHNjOC1WUWVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tpejXM1ijBRySOvPdsi0NwLu8PmnWAupy5qigz7m-Jv_opwuPHBoVTB7IFZ_znlJQYVClpGt8hR5OZ7oIy2DfrwHzAMUFNHUxz55eD5dVueIfTy56RBa4zzS8giBJ9Y7cpoPppfdln9rDSrYc8jJn4S9_T-Uk2wtTTJuCUZc16PxxdvzXpyH25JivFZfYwk4x-KcrSriq2evE56cQGoINRy_wgNXmY-XA6CwtrX8oJ2i0aevKCg8M6FeUtB2Mwa5wEb4hw6t2Bsi0Sz7m1ztqEX_UxwIfxlGR2aXS0EYBtyqRaWEL-me-66VPEDiEcfbJrvQHEQa9GHaNb3pv3aypg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-20 17:51:11,769:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-20 17:51:11,770:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:51:06 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864794357 Replay-Nonce: nHAuMvoxVm0g3EQrhz-ID8d6dFuW5zXD2_qOzgHKzmcOWAdbOPQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:38Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864794357" } 2024-11-20 17:51:11,770:DEBUG:acme.client:Storing nonce: nHAuMvoxVm0g3EQrhz-ID8d6dFuW5zXD2_qOzgHKzmcOWAdbOPQ 2024-11-20 17:51:11,770:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:51:11,777:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3hWbTBnM0VRcmh6LUlEOGQ2ZEZ1VzV6WEQyX3FPemdIS3ptY09XQWRiT1BRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzczNjA1NTcifQ", "signature": "Y-QfkC6gc55mTcN_iU-DV-tupfIbXCucw17ynslJ4eZejXyglrXze5P_9gRlPbljdvS8H9ChmbA78ZHKrPOAQaHzppk_uYBA_bm_wt5LkznvQsFoWLf2JqCAPycSxHohlK2LlSYJ1CN4vFJrFu-WfUkgadaLbr_p8fIK0Q17WOB3enzt63NXnZEOfip3Buq1eMWPovZh345N_PJ9WoX6f06NHwYSwYgkg_WqD2HZQ5g_oskGDEANrVQidUufwK4dTZDYgiukH_BjbKm77XoH8TyVYZA3NZPRG3OE0wuDWWJD0mqNUJIJeODystHTB6MFtTN5eR00gLrPvF0c59EEYQ", "payload": "" } 2024-11-20 17:51:11,944:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777360557 HTTP/1.1" 200 805 2024-11-20 17:51:11,945:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:51:06 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nUZGqlKSovDGh821IHSaGvQIQwdKfqXWpdXOzMtEtvLM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:38Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/Ggc8vg", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/gUrOCA", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/vSGH9w", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" } ] } 2024-11-20 17:51:11,946:DEBUG:acme.client:Storing nonce: q3AS6Q6nUZGqlKSovDGh821IHSaGvQIQwdKfqXWpdXOzMtEtvLM 2024-11-20 17:51:11,946:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:51:11,947:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-11-20 17:51:11,947:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:51:11,948:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:51:11,949:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:51:11,949:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:51:11,949:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:51:11,950:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:51:11,951:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:51:12,013:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-20 17:51:12,229:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:51:12,231:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-20 17:51:12,232:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-20 17:51:12,236:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:10 UTC. 2024-11-20 17:51:12,237:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:51:12,237:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:51:12,243:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:51:12,243:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:51:12,244:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:51:12,250:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:51:12,251:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:51:12,254:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:51:12,710:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:51:12,711:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:51:07 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "MVrn9Z8kPuI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-20 17:51:12,712:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:51:20,790:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8737_key-certbot.pem 2024-11-20 17:51:28,384:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8735_csr-certbot.pem 2024-11-20 17:51:28,384:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:51:28,384:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:51:28,538:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:51:28,538:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:51:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrp3j_reSEQ4J9IcjCYWo7sS2w40E3W5jzQMDYhIvZTUQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:51:28,538:DEBUG:acme.client:Storing nonce: JNlwFRqrp3j_reSEQ4J9IcjCYWo7sS2w40E3W5jzQMDYhIvZTUQ 2024-11-20 17:51:28,538:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:51:28,548:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJwM2pfcmVTRVE0SjlJY2pDWVdvN3NTMnc0MEUzVzVqelFNRFloSXZaVFVRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "R-cEfujBYhEiGxL7_20xmkt1IWu4_Y9Ww8ZLud4PsRk3L8y9Cy6eQoOcqoi98RFRfemM0Q4PzQNU8ayuTIRmacKgdDXmx-DGxyki6y1rFyfKabZkp9JK8u5SgtTYhk5iQWS3VdTGzRkToyBJlOirMkpKNRHqyXIYpw-3exnYWPPGn_b2kX9HtBIZlfIHfKZgF1pSmew3jgLEkZkSL7nYPl0FxmZgthxcnWb8XutbL_Uwr7Y5dwnKYAcE3TdDoWFUnkGA8QWM47dw8pPKUNLC88HoHp92il0eJ1ub-dzCjoQwPVm8zpiNxRebvYIjdBy51fka3DHbIZ6vQHKcWun8Cw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-20 17:51:28,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-20 17:51:28,738:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:51:23 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864862747 Replay-Nonce: usf-jMgX581xL6I982vB3_Acre-Y1QQBqYtgJvxBBS8_prhTy3I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:52Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864862747" } 2024-11-20 17:51:28,738:DEBUG:acme.client:Storing nonce: usf-jMgX581xL6I982vB3_Acre-Y1QQBqYtgJvxBBS8_prhTy3I 2024-11-20 17:51:28,739:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:51:28,746:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1g1ODF4TDZJOTgydkIzX0FjcmUtWTFRUUJxWXRnSnZ4QkJTOF9wcmhUeTNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc0NjAwODcifQ", "signature": "M84RrE30aQplqrwJa6zEUbC2N8KUUske7lgGQ8ps8_ahj-erMuR7pSwcbAvbg8sYaTB2-DDkSVbBvr0ai2tRpVOLNrKkaiL_Jxo0dEE50EVPTQrrgSa46k55KSMUCB3IuBAQ1L9cYxYGfSCGNpIMCNh2tEt5-5SjFL6878ajorjirbcFxIk6ugPMJCN3nxuOlQ4Oqu4Ac3MQ2tqDNQuYVpydBco7e2zAD6Pe_8DWQ1DH0384rDmQ26gBTYTRHPlKG5z30MRXxNRBzPB_xRGRSNM_qVLG2WjFW-yU6k8vcOnxmS12X3mUddvH80AWwKEg5X17maLnYdQvpavQFsGm-w", "payload": "" } 2024-11-20 17:51:28,918:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777460087 HTTP/1.1" 200 805 2024-11-20 17:51:28,920:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:51:23 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrrh-Y0XivnPrYp0ducEpR7BwimyAkpS8SZNMO1_sVdbM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:52Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/f3c_WA", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/ASfKTA", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/tsh-iw", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" } ] } 2024-11-20 17:51:28,920:DEBUG:acme.client:Storing nonce: JNlwFRqrrh-Y0XivnPrYp0ducEpR7BwimyAkpS8SZNMO1_sVdbM 2024-11-20 17:51:28,921:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:51:28,921:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-11-20 17:51:28,922:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:51:28,922:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:51:28,923:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:51:28,923:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:51:28,923:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:51:28,924:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:51:28,925:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:51:28,974:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-20 17:51:29,190:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-20 17:51:29,191:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-20 17:51:29,192:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-20 17:51:29,198:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:32 UTC. 2024-11-20 17:51:29,198:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-20 17:51:29,198:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-20 17:51:29,205:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-20 17:51:29,205:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-20 17:51:29,205:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-20 17:51:29,211:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-20 17:51:29,212:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-20 17:51:29,215:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-20 17:51:29,715:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-20 17:51:29,715:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:51:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Z9B9HuFMVs0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-20 17:51:29,716:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-20 17:51:37,888:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8738_key-certbot.pem 2024-11-20 17:51:46,118:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8736_csr-certbot.pem 2024-11-20 17:51:46,118:DEBUG:acme.client:Requesting fresh nonce 2024-11-20 17:51:46,119:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-20 17:51:46,280:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-20 17:51:46,281:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:51:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nHAuMvoxsP0Kir5WAVNeQoJf-QYrGs6WNzLB1wIXeD6XgjB_eMM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-20 17:51:46,281:DEBUG:acme.client:Storing nonce: nHAuMvoxsP0Kir5WAVNeQoJf-QYrGs6WNzLB1wIXeD6XgjB_eMM 2024-11-20 17:51:46,282:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-11-20 17:51:46,289:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibkhBdU12b3hzUDBLaXI1V0FWTmVRb0pmLVFZckdzNldOekxCMXdJWGVENlhnakJfZU1NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fFs-Qb04wQSVOpptZXiLA0aTtR9AuFTGossN9R_-0XgEs5TPi4TERbT1Pr8au0dsx9HTXNKXr752emgbQWxEeptzsXdTyG85lZ-IGsm5GezwLx5SgntLZSQbcOxlgwSY4xt9G-j1BIOaKrLJlUiV8D0TtwdVsmJX5ArsOsE3wrFTkzF-xoad0woYOyM3QE1TWtREgyhrcPV5ovaipGPu-jikHpG9L-Wf7JjHSf147BCfMoKSkzDTiIVVT6RlqCC2ohQitUukbSZS4jOCXtkHAH5crXRVJs6l855Z4tXPJJvROB0GMCP7Tm5YwHiVq7xV9CHH5xnURxs67Y8pTQcrCQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-20 17:51:46,477:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-20 17:51:46,478:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 20 Nov 2024 16:51:41 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864943797 Replay-Nonce: q3AS6Q6n_OtBU3Fl1PNiOMXxiyBaoSsS96u2tuYOkmbcahmEVEk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:03:05Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864943797" } 2024-11-20 17:51:46,478:DEBUG:acme.client:Storing nonce: q3AS6Q6n_OtBU3Fl1PNiOMXxiyBaoSsS96u2tuYOkmbcahmEVEk 2024-11-20 17:51:46,478:DEBUG:acme.client:JWS payload: b'' 2024-11-20 17:51:46,485:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5fT3RCVTNGbDFQTmlPTVh4aXlCYW9Tc1M5NnUydHVZT2ttYmNhaG1FVkVrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc1NzIzOTcifQ", "signature": "EDfnmUz3IgoQ4hrKmoCdA1P7bYLwRHdBrHZqGwuPAisOx3XOz7tf8d24T19Jc4YOxXfc43MRDO5aWzflEr7ZF6QhdftSIjNbHeyqL-AKW7beLpd_E_fZHFT7QfkmqPpEG0JL6dHg-exRAF46e2PMyR87kaVJA6vSoZRZzOBMDzraIcNdJZthNYvFYNgajdV2e1mTviCFAOXIrxF30XH8Vh_bIJEIYHemu0cx26T0NXi18UPctDqvfJQn013ROfje3j_wiGv1d_9SQdWcvWM_YhyWYdSrqLLaPuXEtQOZW5d4y1GPt8-UIU1o6e2wVnvW-D4jfR9zAKqWEvWbWbS58A", "payload": "" } 2024-11-20 17:51:46,653:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777572397 HTTP/1.1" 200 805 2024-11-20 17:51:46,654:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 20 Nov 2024 16:51:41 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nhc0o5FVm3fXx-KxJiD1sfLOLGvH3Ou5rcQnT9Ep8qBQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:03:05Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/qQ1QMQ", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/HIxR5w", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/avR61Q", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" } ] } 2024-11-20 17:51:46,654:DEBUG:acme.client:Storing nonce: q3AS6Q6nhc0o5FVm3fXx-KxJiD1sfLOLGvH3Ou5rcQnT9Ep8qBQ 2024-11-20 17:51:46,655:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-20 17:51:46,655:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-11-20 17:51:46,656:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-20 17:51:46,657:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-20 17:51:46,658:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:51:46,658:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-20 17:51:46,658:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-20 17:51:46,659:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-20 17:51:46,660:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-20 17:51:46,660:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-11-20 17:51:46,660:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-11-20 17:51:46,662:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-11-20 17:51:46,664:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)