2024-11-17 16:39:45,496:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-11-17 16:39:45,496:DEBUG:certbot._internal.main:Arguments: [] 2024-11-17 16:39:45,496:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-17 16:39:46,324:DEBUG:certbot._internal.log:Root logging level set at 20 2024-11-17 16:39:46,324:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-11-17 16:39:46,366:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-11-17 16:39:46,416:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-17 16:39:46,639:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:39:46,640:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-11-17 16:39:46,645:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-11-17 16:39:46,654:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:06 UTC. 2024-11-17 16:39:46,654:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:39:46,654:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:39:46,660:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:39:46,660:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:39:46,660:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:39:46,667:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:39:46,668:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:39:46,670:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:39:47,179:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:39:47,180:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:39:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7hLuUysEshI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:39:47,180:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:39:54,246:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8641_key-certbot.pem 2024-11-17 16:40:00,892:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8639_csr-certbot.pem 2024-11-17 16:40:00,892:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:40:00,892:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:40:01,042:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:40:01,042:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:39:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXh75IaSfiMWeOmUeQubxf6JNHsVt8xfyVw_OPR5-uodg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:40:01,043:DEBUG:acme.client:Storing nonce: usf-jMgXh75IaSfiMWeOmUeQubxf6JNHsVt8xfyVw_OPR5-uodg 2024-11-17 16:40:01,043:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:40:01,049:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hoNzVJYVNmaU1XZU9tVWVRdWJ4ZjZKTkhzVnQ4eGZ5VndfT1BSNS11b2RnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BCZQRTRh9mtZbkFSTUncGjMEFj3o1-dTrtaf98ffTqQwRmijVlmoffmPuqyeBuUZ6hDYpiVPfYgWzVQ5RdV8jkSq7dqpjf_h84bA5KJTl97Rs2WmrGKdnZwuR3UEtnMwzl0z9dX9vVYfgCeC7IYtrTyxTACmF-5-pqOOW0cBVa6vVbjWh6XBzrbWNvOB7zCnpvNhP44SQ9YLeR5Vi6u-R5Oni8Nto5-MwHdgzjrCAFLGo8B48aa1BAXqEsmNxFy8KmRHORX2_PkTrRj6BAi-gyLXRuchqdmWumsHHHTZLquAn2Fq1qwrtZeQFeTB0bkiZIZvnAHeIYtvovT8fKEpAQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-17 16:40:01,229:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-17 16:40:01,230:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:39:55 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863894397 Replay-Nonce: usf-jMgXl-leuacABXSiuvOXfCP1-fut85L2NYVjdzEraggpsKg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:15Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863894397" } 2024-11-17 16:40:01,230:DEBUG:acme.client:Storing nonce: usf-jMgXl-leuacABXSiuvOXfCP1-fut85L2NYVjdzEraggpsKg 2024-11-17 16:40:01,231:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:40:01,237:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hsLWxldWFjQUJYU2l1dk9YZkNQMS1mdXQ4NUwyTllWamR6RXJhZ2dwc0tnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYwNjIzMTcifQ", "signature": "PDZuc01orEX5A1pziyawrLEJIqjkUiPO2VrgWfY2TDaB-szxczk3wVD3F6BUzOLwtJzdI482aMHxXxw5aHAULBtedPrMuudy_F0T60D3sprclLFa3l53_aXN4DMM9f6Occ69MZ40ACePTHv7l0tsAvGm3-vEcMRb_cGczNGMDMG817IoJHoeexL5S_cfH-cSOOTRIp54tqy3WPDEfYjiw6r41gYqzXVy2iiiWQDbWh5oWNoHs3JZp5yjxdoLhKbx4KckYhNd73GBXCvX4GUMNKY-MCO8380jkccJ2huaQ7VgbWuZSGuj6je_twvhx-dzDOx3Sq_F3Fi242V9VC8bvQ", "payload": "" } 2024-11-17 16:40:01,398:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776062317 HTTP/1.1" 200 810 2024-11-17 16:40:01,399:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:39:55 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXwd2J6uhD3oIaaxM0IBZB8Ns2vxDQV3CXN7CJKGKIRe4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:15Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/_bn1HA", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Fppccw", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Nohq5w", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" } ] } 2024-11-17 16:40:01,399:DEBUG:acme.client:Storing nonce: usf-jMgXwd2J6uhD3oIaaxM0IBZB8Ns2vxDQV3CXN7CJKGKIRe4 2024-11-17 16:40:01,399:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:40:01,400:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-11-17 16:40:01,411:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:40:01,411:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:40:01,415:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:40:01,415:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:40:01,415:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:40:01,416:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:40:01,420:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:40:01,463:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-17 16:40:01,682:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:40:01,683:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-17 16:40:01,684:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-17 16:40:01,689:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:27 UTC. 2024-11-17 16:40:01,689:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:40:01,690:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:40:01,696:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:40:01,696:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:40:01,696:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:40:01,704:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:40:01,705:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:40:01,707:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:40:02,203:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:40:02,203:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:39:56 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Q0PSmzq1lO4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:40:02,204:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:40:09,108:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8642_key-certbot.pem 2024-11-17 16:40:14,911:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8640_csr-certbot.pem 2024-11-17 16:40:14,912:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:40:14,912:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:40:15,069:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:40:15,070:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:40:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6n2za8APUbQ-1duiMMGsR3iwhVfWcwWz_Z6wSODe64fjY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:40:15,070:DEBUG:acme.client:Storing nonce: q3AS6Q6n2za8APUbQ-1duiMMGsR3iwhVfWcwWz_Z6wSODe64fjY 2024-11-17 16:40:15,071:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:40:15,077:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm4yemE4QVBVYlEtMWR1aU1NR3NSM2l3aFZmV2N3V3pfWjZ3U09EZTY0ZmpZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OimIbIZCw4AWAAie1XBMJHjCt2x_Nrx2dwX-eVqct-P0lvB2NIwOqX1caiJvlive7r2DaKeQdO1vUL8zHXJZwLJnlGEASYPMaFZcYDUcRw5c8Bc5D9hMM0-OefwHpwSjCXSmY-RQTFS_cB-jBETKVJ2t8UJjHoETuAbLMVolo56p9tOo9XU_ODOxS46nabkEUtT6dhkt-VrX55nsB5o65c1olR1arU9j2H1Do3cfwh_NoB8dgCY1MB-ziCmlUKXreHoOgndNdRdfllJ-4BcO9d54GfDfhmT_hOAyzHqieGNNoML2pD6_1MvND8lfU8uvg0gQlcKdNeQ9b36H0Gk4KA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-17 16:40:15,280:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-11-17 16:40:15,281:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:40:09 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863990237 Replay-Nonce: q3AS6Q6nPrwnwsPQvPYBcAzwO0LfP0BVC5BfXX2J_2gSTY2kgCU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:28Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863990237" } 2024-11-17 16:40:15,281:DEBUG:acme.client:Storing nonce: q3AS6Q6nPrwnwsPQvPYBcAzwO0LfP0BVC5BfXX2J_2gSTY2kgCU 2024-11-17 16:40:15,281:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:40:15,287:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5Qcndud3NQUXZQWUJjQXp3TzBMZlAwQlZDNUJmWFgySl8yZ1NUWTJrZ0NVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYxOTEyMjcifQ", "signature": "AdxCMNVniH2jA270_P0KrGoZ-QRG8Al1U7p-a7DOL7UfGD6zQdprGZkzINjUfWhx9zSHBofuStJT6gFH_m0Ne-4bsx6O3N9mN_7hGvOU5mh6naV0ZZQF6D3q0gOjk4EKIlsQsfKRNM-PXsDqThbCYV0_N3V6ABEAQ8XssmTkyGGwQn0wC60uQ1ng-ciCwEHkbTysBKgFNLzFKY6sq2QqemK0hTht6pp_Z7wkP6fo_bLBOrwK67hJIVRcd7ac98pLjUwIQMbW5nyFvNls1djeKj2tFwxH31TL0TFIAHbJaXh74MlLd9n8YHEl6XRk9bX8ESxMsqQobKDCgItb8Fr49g", "payload": "" } 2024-11-17 16:40:15,450:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776191227 HTTP/1.1" 200 804 2024-11-17 16:40:15,451:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:40:09 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HUzLaJLkFynTX96HOXyr_J43Gr1MNRGtFIK1ZlesS750 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:28Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/vZq3rg", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/Hvp1ig", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/tag9BQ", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" } ] } 2024-11-17 16:40:15,451:DEBUG:acme.client:Storing nonce: crKnBf1HUzLaJLkFynTX96HOXyr_J43Gr1MNRGtFIK1ZlesS750 2024-11-17 16:40:15,452:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:40:15,452:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-11-17 16:40:15,453:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:40:15,453:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:40:15,454:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:40:15,454:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:40:15,454:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:40:15,454:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:40:15,455:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:40:15,508:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-17 16:40:15,760:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:40:15,762:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-17 16:40:15,762:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-17 16:40:15,767:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:47 UTC. 2024-11-17 16:40:15,767:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:40:15,768:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:40:15,773:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:40:15,774:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:40:15,774:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:40:15,778:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:40:15,779:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:40:15,781:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:40:16,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:40:16,227:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:40:10 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NuosUhbv2l4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:40:16,228:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:40:22,504:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8643_key-certbot.pem 2024-11-17 16:40:28,279:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8641_csr-certbot.pem 2024-11-17 16:40:28,280:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:40:28,280:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:40:28,429:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:40:28,430:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:40:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXtp16mof5Q2glpurN2YAQRF3oyb_OTHDF9bphR7m8K7c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:40:28,430:DEBUG:acme.client:Storing nonce: usf-jMgXtp16mof5Q2glpurN2YAQRF3oyb_OTHDF9bphR7m8K7c 2024-11-17 16:40:28,430:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:40:28,436:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1h0cDE2bW9mNVEyZ2xwdXJOMllBUVJGM295Yl9PVEhERjlicGhSN204SzdjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ap65MZfqp-bnbN1sdJegE_7u3SAf6gJ8nYkUQKYKLK06AWso9LfPqp69VAlS8EQr8eawv3AF4z1ElQhyLnhomLAvXaK2xmZ6mTRdI2GCNTeDWpydtnl7J1PGf-2WPvnHJPITmOcRWsrF2wQGxCFKltdCekGoyp3lBdaDv4aiVaX9Z6lPiHa0r3tHdEZBS2Xr_JdUjZOFdwge6pu5jB54EbETRw5EhIoUz7eWC2pPEb0BHYdmqqihJkNn53IrXYWse0TeglYSZG5F2ohIiUtQ2gGbmRP_IMlpIAFUVH45HoK3ZojxgjwHbbIdG0RdChh9--QIHvEZlufgtrqRU2Hc6Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-17 16:40:28,617:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-17 16:40:28,618:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:40:22 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864075277 Replay-Nonce: usf-jMgXSsmgosrmL2FZ77jKxqrTX2snqn3ufZHbr4Zsp3Wxs5g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:41Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864075277" } 2024-11-17 16:40:28,618:DEBUG:acme.client:Storing nonce: usf-jMgXSsmgosrmL2FZ77jKxqrTX2snqn3ufZHbr4Zsp3Wxs5g 2024-11-17 16:40:28,619:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:40:28,625:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hTc21nb3NybUwyRlo3N2pLeHFyVFgyc25xbjN1ZlpIYnI0WnNwM1d4czVnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYzMDkzMTcifQ", "signature": "Jr0k_3ycS9a-fzgdzXXQSSlNl8edTg2OgfGyvRgAu9HAmQc-I1TrTOkaFh4V0g8F0OrieTjJqzK8nAIgYGDCE8-HNBurR81VRXoP2SOGw6ngBc8oACfhquDTtjLV4mYzu2vMGJU7Z0Z_gYzH12IDCgIR58bLt5MsG0oE9KJTOKKLZ2up70BBSH1FkxsfodCYmpn4et7Zgp0ja9IaRd-toEuxPvPFrXnxOm2WQKUp4XCtp0YyQqtZnjZ-m0R8MFHxEpYSH7pi0EL8FwAAGQDf3KOqTchmJPeSc1x7yC3MvdSX6-dQLy16FDb9K9HDBRwUmzzbszCEmWFF7iE2mn5dFQ", "payload": "" } 2024-11-17 16:40:28,779:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776309317 HTTP/1.1" 200 807 2024-11-17 16:40:28,780:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:40:23 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrXLV3HFP3JAr3yxixgUJEZp2FejgQbz71K-9UxNOPLU0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:41Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/9T0aKw", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/RhhX0A", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/8Wvihw", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" } ] } 2024-11-17 16:40:28,780:DEBUG:acme.client:Storing nonce: JNlwFRqrXLV3HFP3JAr3yxixgUJEZp2FejgQbz71K-9UxNOPLU0 2024-11-17 16:40:28,781:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:40:28,781:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-11-17 16:40:28,782:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:40:28,782:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:40:28,783:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:40:28,783:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:40:28,783:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:40:28,784:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:40:28,785:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:40:28,836:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-17 16:40:29,102:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:40:29,103:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-11-17 16:40:29,104:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-11-17 16:40:29,109:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-11-17 16:40:29,112:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:40:29,177:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-17 16:40:29,364:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:40:29,365:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-17 16:40:29,366:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-17 16:40:29,372:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:08 UTC. 2024-11-17 16:40:29,372:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:40:29,372:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:40:29,378:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:40:29,378:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:40:29,378:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:40:29,384:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:40:29,385:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:40:29,387:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:40:29,840:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:40:29,841:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:40:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "e2dCyk4H1n8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:40:29,841:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:40:36,291:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8644_key-certbot.pem 2024-11-17 16:40:42,098:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8642_csr-certbot.pem 2024-11-17 16:40:42,099:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:40:42,099:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:40:42,253:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:40:42,254:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:40:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrUyTW2HJCidmKK4gDA6-uPHs7TiJ9Cl_ShPzwARNi8yQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:40:42,254:DEBUG:acme.client:Storing nonce: JNlwFRqrUyTW2HJCidmKK4gDA6-uPHs7TiJ9Cl_ShPzwARNi8yQ 2024-11-17 16:40:42,254:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:40:42,260:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJVeVRXMkhKQ2lkbUtLNGdEQTYtdVBIczdUaUo5Q2xfU2hQendBUk5pOHlRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "a234BqYCA9NkVTkqtZXskaltMMB3Lg_w9RU1_FRnUzm3TqIn2826QWtS4R3JNBTzagnfjIjCAO7a10gtpNRwqxqGil6Kj-3wiOAnsMDlFsAs8Re9cP9UeR-AtXV_abJ9-KXAJJEsN1SDcmsZyRqj2yP_rQIJDieVoodLb-7_GBbmSiJGxQnTyhG9RHb3VIyYyRoDB6XA3mnTYKPx0niNdb-Mu5-viyM-En3O2phYLtFhGduI08gdyJYfmBMiAZ5esDc-DvIh64cacR3Sp86bUrKLhATTHzvONpN-WzMeUTdbD45i0ihTprhL0-De03RtJSIANuhVsXXYRFM_Pf8djQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-17 16:40:42,454:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-11-17 16:40:42,455:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:40:36 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864158237 Replay-Nonce: JNlwFRqrMGMoMWArMtvS_zWqXNYZOEOEzpU_CNNZjRrwnu5rjYw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:54Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864158237" } 2024-11-17 16:40:42,455:DEBUG:acme.client:Storing nonce: JNlwFRqrMGMoMWArMtvS_zWqXNYZOEOEzpU_CNNZjRrwnu5rjYw 2024-11-17 16:40:42,455:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:40:42,461:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJNR01vTVdBck10dlNfeldxWE5ZWk9FT0V6cFVfQ05OWmpScndudTVyall3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY0MzIxMDcifQ", "signature": "JKLGKAWUkic5EZ-hbd2CKWk_X04cl_AG0aYp9dJEjKqPgr28NnFUU8zcBH9E3bmygwrGjeWhvAMgCtCPKN1nwyoea8bpRzALjmKXQTfalJxhhUIH-ocZhHM4YP4ucAhR0tg08jUS-X-6lSP5Wl_l1qigqE-8olbv1pZOZD5D4Sydk5_IM1xm5w31SxoMs3yOB1ZOazGyHrD8yC3FiJMaYQYxiFvWFbHdBjBG-FKg51pF-12XK7aOhnGKeYc2Pf2IoNn5NE5is9X-lK5yqXlG_KsEpYgQT5n69zNnZ9S9seHirW7zqqBgd0QFR08oc88ao7_vDR_bCqLfZPFaDd5Z_A", "payload": "" } 2024-11-17 16:40:42,618:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776432107 HTTP/1.1" 200 801 2024-11-17 16:40:42,619:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:40:36 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrGsFztJC1qe9rp68tZbHWUARVD9SPdvpLB0ocErP1sBA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:54Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/iWIilA", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/U1YmAg", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/Wk_i8A", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" } ] } 2024-11-17 16:40:42,619:DEBUG:acme.client:Storing nonce: JNlwFRqrGsFztJC1qe9rp68tZbHWUARVD9SPdvpLB0ocErP1sBA 2024-11-17 16:40:42,620:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:40:42,620:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-11-17 16:40:42,621:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:40:42,621:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:40:42,622:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:40:42,622:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:40:42,622:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:40:42,622:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:40:42,624:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:40:42,681:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-17 16:40:42,925:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:40:42,926:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-17 16:40:42,927:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-17 16:40:42,932:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:27 UTC. 2024-11-17 16:40:42,933:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:40:42,933:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:40:42,938:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:40:42,939:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:40:42,939:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:40:42,944:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:40:42,945:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:40:42,947:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:40:43,400:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:40:43,400:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:40:37 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8DYwdDajh70": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:40:43,401:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:40:49,889:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8645_key-certbot.pem 2024-11-17 16:40:55,945:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8643_csr-certbot.pem 2024-11-17 16:40:55,945:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:40:55,946:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:40:56,095:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:40:56,095:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:40:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrntwLb2mP-4RyIIP9fKwuqajej6mvyLfNfPycNh6dQD4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:40:56,095:DEBUG:acme.client:Storing nonce: JNlwFRqrntwLb2mP-4RyIIP9fKwuqajej6mvyLfNfPycNh6dQD4 2024-11-17 16:40:56,096:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:40:56,102:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJudHdMYjJtUC00UnlJSVA5Zkt3dXFhamVqNm12eUxmTmZQeWNOaDZkUUQ0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "drxG9c5TWPBRKYjn8ok0mjky6ZXojsFiZ5BiAXu2T1LBtac-AiPctPSy7jaRAn1YzD8LZfwQW7n5RDLoAflcRTvMi_wZ5eOjCTfn4fLeBM_0BsQRbOiuIo-xmNPNZ7Hk_5DtD4_t4M6K9R6fzPkj4onCYT3WldKFxmL1mCUO5gLFYiSkuR06KPlkmE5QBJW4xm4pXQl3YlWrjba2S8YC4nSY-hm355Berq9WpIYc45FwDcLXfaNBLPGMGTm9m458ZzstPD0dLI8_2tp6ewak7m-ZafyYyQOMIoMghhGuPzLDBf5VDJOpumGFIplWr6MNFE-LcQgUTjI0hyhnGnuj3w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-17 16:40:56,343:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-17 16:40:56,344:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:40:50 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864248527 Replay-Nonce: JNlwFRqrIYFa4TsvEZKvL4nfA4Kj7_Gg282rjOWo381Vzittzq4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:07Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864248527" } 2024-11-17 16:40:56,344:DEBUG:acme.client:Storing nonce: JNlwFRqrIYFa4TsvEZKvL4nfA4Kj7_Gg282rjOWo381Vzittzq4 2024-11-17 16:40:56,344:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:40:56,350:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJJWUZhNFRzdkVaS3ZMNG5mQTRLajdfR2cyODJyak9XbzM4MVZ6aXR0enE0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY1NjE2NzcifQ", "signature": "MCJUjOXOmciD-ZTsXb9BJH3X2lXGCA1Kzp-kFjXpO6yA7nnISLFHcE4FX4gxmk9GnVUFreiYm73q1tS8FpOf3wO9S6wbhNRqTfzg-BHyYaT9-a7SusbMtZOp89jhktzH1rUlo06i6G8PpJQHbPFLlNlpBLbrtsRUHkCcsC0JEOtuf2UczVr35RNfkMZz0wa23Ck8KC3rATgJqwpuyxUlAB1BOBVU72Kmk0cNw-xn0Ua6z5-JJmuEc2XprTBxRUceBYfE7qX_m-ICDkmqnlDdD2k3ZYqwTc_1LZsT7kKAs-vNuKhJ41rnGPn3YEu5cfPMkS_mry9MkzAkcmK8RA6Nsw", "payload": "" } 2024-11-17 16:40:56,510:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776561677 HTTP/1.1" 200 805 2024-11-17 16:40:56,511:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:40:50 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrHX5FpFWdgSMoZo3683APlQ9aD9l0WfDxzwnoCEcs1FM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:07Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/S4Po3g", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/QOkASw", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/kvNskw", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" } ] } 2024-11-17 16:40:56,511:DEBUG:acme.client:Storing nonce: JNlwFRqrHX5FpFWdgSMoZo3683APlQ9aD9l0WfDxzwnoCEcs1FM 2024-11-17 16:40:56,512:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:40:56,512:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-11-17 16:40:56,512:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:40:56,513:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:40:56,513:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:40:56,513:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:40:56,514:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:40:56,514:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:40:56,515:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:40:56,560:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-17 16:40:56,755:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:40:56,757:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-17 16:40:56,757:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-17 16:40:56,762:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:58 UTC. 2024-11-17 16:40:56,763:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:40:56,763:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:40:56,768:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:40:56,768:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:40:56,769:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:40:56,774:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:40:56,774:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:40:56,777:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:40:57,263:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:40:57,263:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:40:51 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7a9JSVGF8qM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:40:57,264:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:41:03,203:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8646_key-certbot.pem 2024-11-17 16:41:09,198:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8644_csr-certbot.pem 2024-11-17 16:41:09,199:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:41:09,199:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:41:09,360:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:41:09,361:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nAXQISxTbNwFEbpWOrcBuOowE_CxVrg7IcVYKOzPPqDg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:41:09,361:DEBUG:acme.client:Storing nonce: q3AS6Q6nAXQISxTbNwFEbpWOrcBuOowE_CxVrg7IcVYKOzPPqDg 2024-11-17 16:41:09,361:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:41:09,367:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5BWFFJU3hUYk53RkVicFdPcmNCdU9vd0VfQ3hWcmc3SWNWWUtPelBQcURnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "X_SPgIBUjKo5F9KCNFX87-bR5v2QRwEJJ6musbvZ_0bkPtgW0eHCqXFf2XWKzZoQ6nE7q-t028Q0_YrYSG8SyZQB0fsETaaS6P8iC-HLniRB-h1BddtyysxDq0ikMJyc546jYBmKCFKrkr2LDQ22XPwBz47HKy1YpMoRipEA54diFcU4S37bT93X_Zhrwb8rHOp-n57IfAJi4X3InFR84HiKvR8YTiB_Ltba7KkDTEVC7yJqr3p_T5dVdr5JCI4bUioxVQ-0jrWc9glXxF0P-pDEAV4h9_cAUxUEWgfhucS7TZkz4oF31xMf1QADTxmsKOmx6wogwHFAYrdUKD0rbw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-17 16:41:09,554:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-11-17 16:41:09,554:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:41:03 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864332297 Replay-Nonce: q3AS6Q6nC2SFfrSAZa7b7NSJrxYLsjnaK32DKWNS_5xE2KwihNo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:20Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864332297" } 2024-11-17 16:41:09,555:DEBUG:acme.client:Storing nonce: q3AS6Q6nC2SFfrSAZa7b7NSJrxYLsjnaK32DKWNS_5xE2KwihNo 2024-11-17 16:41:09,555:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:41:09,561:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5DMlNGZnJTQVphN2I3TlNKcnhZTHNqbmFLMzJES1dOU181eEUyS3dpaE5vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY2ODU2NTcifQ", "signature": "di0QvCZrJoz0v1px6uMf8nsFJ0m8bEq9Pj04gy_Hb-ZFnxO05Hy6U59JI5bEG-b7y5YVjj9C0n0f8DpLEq_MXNA22ZciaAkEaV75dF-BFbqfSu2690I3TZHrgcySk0Gfeg3VkqpxkPBbMtqXbz2deMh5ddlI8lPy4Bi4TZI7N6CjrC3rz6Cu5NSlLv4DBHeNEuZVzFcF3LQz4UIrb4iqjS8N-L5210LY4vZeNzg_ciANiqGPtYiJjQtBHvusHKinD4cY-RdeLqAuASEYnyE5dM88UU-ER6V08z5jB9lFG_AGtckuYFxTUWcPWYdYl3wrScPopahpHwck1LYrFLxVWQ", "payload": "" } 2024-11-17 16:41:09,727:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776685657 HTTP/1.1" 200 809 2024-11-17 16:41:09,728:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:03 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nN0LoYJjB5R__ozzF6uawAmQHTQuCfOwLV_q8ajOf3c8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:20Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/BBENhw", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/DgbGnw", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/s3nu5w", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" } ] } 2024-11-17 16:41:09,728:DEBUG:acme.client:Storing nonce: q3AS6Q6nN0LoYJjB5R__ozzF6uawAmQHTQuCfOwLV_q8ajOf3c8 2024-11-17 16:41:09,728:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:41:09,729:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-11-17 16:41:09,729:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:41:09,729:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:41:09,730:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:41:09,730:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:41:09,730:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:41:09,731:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:41:09,732:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:41:09,780:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-17 16:41:10,061:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:41:10,063:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2024-11-17 16:41:10,063:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2024-11-17 16:41:10,067:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:15 UTC. 2024-11-17 16:41:10,068:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:41:10,068:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:41:10,073:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:41:10,074:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:41:10,074:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:41:10,089:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:41:10,090:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:41:10,093:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:41:10,574:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:41:10,574:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:04 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "0vD1G5YsVhg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:41:10,575:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:41:17,251:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8647_key-certbot.pem 2024-11-17 16:41:23,031:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8645_csr-certbot.pem 2024-11-17 16:41:23,032:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:41:23,032:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:41:23,193:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:41:23,194:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HJKA8Jx4LUXjslzmv8w0XobHBxLElzuZdd8KIt6QtIvQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:41:23,194:DEBUG:acme.client:Storing nonce: crKnBf1HJKA8Jx4LUXjslzmv8w0XobHBxLElzuZdd8KIt6QtIvQ 2024-11-17 16:41:23,194:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:41:23,200:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhKS0E4Sng0TFVYanNsem12OHcwWG9iSEJ4TEVsenVaZGQ4S0l0NlF0SXZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mxvZJdDwRvEsrJJ7XdYjoEiRi-87HaqzS0WO12TjtE2prF4D8NHYMJZAYbQINpCKMU8a6TFlJt1Ac9g3DnE5qXQVmIJHqMS6AUMg4EST_ELqCAk2t88-lJVcogDhrT9UH-Y_XhERtovqOrKz9HfKDS4geIHqHRBm59gIXu_ja7OcK2R6fgC7hvxQjKirWBniezehgHavDJTy3McIyf653Ur-ENvwbtgFNMFX0_UifK4G-KCL7xNePEhtBQoydminrrOwvTR6DM7Er8G1xZpEJ_ofPfBAkM7gOJoJg7h7imt83L4rB6-Y4Hi0CuNcnIW3XLfwdsMd1OseScZ1J9kpCQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-17 16:41:23,391:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-17 16:41:23,391:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:41:17 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864408807 Replay-Nonce: crKnBf1HACAdmM5u0YDDrw2S10i7rOcINg4CKuKmqcaDtgSb43w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:33Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864408807" } 2024-11-17 16:41:23,392:DEBUG:acme.client:Storing nonce: crKnBf1HACAdmM5u0YDDrw2S10i7rOcINg4CKuKmqcaDtgSb43w 2024-11-17 16:41:23,392:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:41:23,398:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhBQ0FkbU01dTBZRERydzJTMTBpN3JPY0lOZzRDS3VLbXFjYUR0Z1NiNDN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY4MDA1MjcifQ", "signature": "CqxNYmK9R2oDA5z7mTuJ0sOySumV4PRpfIRVk58nlvXcB3D2udvpdVTS_S9kO4qOdXnQFidNykd8UiLlEL4xnilg5zyLGAlnWxNz9uAD2ZnfQ2ZtlJwAkzRD5WH_OKnAHxnS6JgrMRWLU9BWXkD5bHPFVhcKqGpPkdwM1w7cb9nG40Ta8C-K1jUb5nHWN6ZPU2AkMTZx9Bp4PFf_IdmzgS4HNRUM9LuRP9qH4YJ9pK33od9ienRXY13xN5iLbP7JhoIAJpu5xnJ62KSItEU347qtEdLTj94nyOEQ3zzVao-2muLEuTVq4iOcBcJhWL584pBlDh3A0QzjZtd0yoXqJg", "payload": "" } 2024-11-17 16:41:23,564:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776800527 HTTP/1.1" 200 807 2024-11-17 16:41:23,565:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:17 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nntxTVhkUFC2atf9bjlWVrlMLRbkh_PBOFlT5jo5O02I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:33Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/uHoKaA", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/yjXnZA", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/B8BcEw", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" } ] } 2024-11-17 16:41:23,565:DEBUG:acme.client:Storing nonce: q3AS6Q6nntxTVhkUFC2atf9bjlWVrlMLRbkh_PBOFlT5jo5O02I 2024-11-17 16:41:23,566:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:41:23,567:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-11-17 16:41:23,567:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:41:23,567:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:41:23,568:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:41:23,568:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:41:23,568:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:41:23,569:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:41:23,570:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:41:23,672:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-17 16:41:23,841:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:41:23,842:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-17 16:41:23,842:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-17 16:41:23,848:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:37 UTC. 2024-11-17 16:41:23,848:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:41:23,848:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:41:23,854:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:41:23,854:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:41:23,854:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:41:23,860:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:41:23,861:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:41:23,863:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:41:24,354:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:41:24,354:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:18 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7sk3tQYpJL0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:41:24,355:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:41:31,008:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8648_key-certbot.pem 2024-11-17 16:41:36,833:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8646_csr-certbot.pem 2024-11-17 16:41:36,833:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:41:36,833:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:41:36,994:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:41:36,995:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HzHff4Kjc4se2l7n_0l1x6oNqSX3jOmUKFosnSAl0pFE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:41:36,995:DEBUG:acme.client:Storing nonce: crKnBf1HzHff4Kjc4se2l7n_0l1x6oNqSX3jOmUKFosnSAl0pFE 2024-11-17 16:41:36,995:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:41:37,001:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUh6SGZmNEtqYzRzZTJsN25fMGwxeDZvTnFTWDNqT21VS0Zvc25TQWwwcEZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Iz4e4xuk9faRip3mcnJOK1zMiCYwhqxKxsoLBuDvMqisLsa1P52MKb6o3ZOLOW2WfC7NcP08pF9PeQyyxLYoeLtvT1SN87BRMKcjmknkK3K1UXhJpc5IcRCFQK1rBK1XgiYW7zGgfDc925lV30vP76gW0BNb8-gsfUnTb_0rYUhAnlUOOoG7WelhqZqb1CD-JOz_j7Q4mp0EM-FLyn3iQ7gkVG0aZ9pzV2FcgNQTWxaoZvFoQTOYQ5zLiUDzfygzT1S1TKbWRS1LKy8rgZIA2HH4P4PGQSlSjfN11ODNq-A254D1iAKsfOJ8qLfHcQ9hRdN3xWhd7aw6plQBs_ZCsQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-17 16:41:37,176:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-11-17 16:41:37,177:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:41:31 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864481367 Replay-Nonce: crKnBf1HTy8UH9npXwtisPpuLBT0XWhqFFfqxATut-0xp52ByeE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:46Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864481367" } 2024-11-17 16:41:37,177:DEBUG:acme.client:Storing nonce: crKnBf1HTy8UH9npXwtisPpuLBT0XWhqFFfqxATut-0xp52ByeE 2024-11-17 16:41:37,177:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:41:37,183:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhUeThVSDlucFh3dGlzUHB1TEJUMFhXaHFGRmZxeEFUdXQtMHhwNTJCeWVFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY5MDgyNjcifQ", "signature": "TGkhtrUh4ERupiLcddTQnq4sleEIXZW77rcTbRu1rxrQtOdiUDci-bW9TQ6_jq1e4vbVrO1pKK5OV0oOFtrZacuCQsNLpdhWScfLxvOmqKQm7F_Al9rsPbniRTF_TevW_YzbLX1o_FZ_IFP5R-iaCR66hOI4IhqA3BFajbEk0bSnrKdeFna88b5a5RT4YfHgU1Txd9oFEJxi8CjrIOKRrGD3CF4iZrV2eemy5r1SNAkWf2xtoVCUlgrNJM3reuqSI2dJU0tRYeM7dYd8DjZgFL0wyrrDJjDg1GeixczMuu14sGQsaLlxQPvfMLxaav-aFwGrO7ctURPEE0gNyhR-AA", "payload": "" } 2024-11-17 16:41:37,352:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776908267 HTTP/1.1" 200 806 2024-11-17 16:41:37,352:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:31 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nZN6Hc8p5BVchAcS53ks2MF_9ohIiQ5wcc1Un8lFnyC4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:46Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/PhZSOw", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/tMqdPg", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/pzyROQ", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" } ] } 2024-11-17 16:41:37,353:DEBUG:acme.client:Storing nonce: q3AS6Q6nZN6Hc8p5BVchAcS53ks2MF_9ohIiQ5wcc1Un8lFnyC4 2024-11-17 16:41:37,353:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:41:37,353:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-11-17 16:41:37,354:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:41:37,355:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:41:37,355:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:41:37,356:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:41:37,356:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:41:37,356:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:41:37,357:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:41:37,405:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-11-17 16:41:37,405:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:41:37,405:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-11-17 16:41:37,413:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-11-17 16:41:37,416:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-11-17 16:41:37,416:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-11-17 16:41:37,416:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-17 16:41:37,417:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-11-17 16:41:37,419:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-17 16:41:37,461:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-17 16:41:37,690:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:41:37,691:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-17 16:41:37,692:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-17 16:41:37,697:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:56 UTC. 2024-11-17 16:41:37,697:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:41:37,697:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:41:37,702:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:41:37,703:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:41:37,703:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:41:37,719:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:41:37,720:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:41:37,722:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:41:38,214:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:41:38,214:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:32 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gJh_nDzVJCY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:41:38,215:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:41:44,252:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8649_key-certbot.pem 2024-11-17 16:41:50,021:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8647_csr-certbot.pem 2024-11-17 16:41:50,022:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:41:50,022:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:41:50,186:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:41:50,187:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HpXDAJnkSbzC6We0lX45aLF-x8h7V8l4eG4EMdzUUmPk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:41:50,187:DEBUG:acme.client:Storing nonce: crKnBf1HpXDAJnkSbzC6We0lX45aLF-x8h7V8l4eG4EMdzUUmPk 2024-11-17 16:41:50,187:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:41:50,193:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhwWERBSm5rU2J6QzZXZTBsWDQ1YUxGLXg4aDdWOGw0ZUc0RU1kelVVbVBrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "IY5wmyI79on1xFIBYT6CIX2nlrHKYnpi2SvaBVjONSjtJ78bKymf2QG1dYQaFPgnB6WqJlzk_WxwnL_MkRJMTtn8vRtovFABt2fCPCDeYIvuK-W8f2_NBRLrwkjUKDf1B3xBKNtFrvtGDTZ2zWvr1OMFLTlTFpfiLudYNWlzTVosSkrAAZUCU4S3bliS-HyJTZpc6CAe5ijStbFUq7gG8_L1zCt-ghRRRSHbdcdkMrzd2140CD-tJOkihN7YSyJJ1mTKxkMoFNll8p9qLOjU-hBU1dr75r0nzENXgsA0ejvBTUFGDhjnSwHp_i786pPFG4U_LQP7pZpMCH8g_EomBQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-17 16:41:50,402:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-17 16:41:50,403:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:41:44 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864554417 Replay-Nonce: crKnBf1HP_ePYKCzYESgsSHUKjCr0QOJBcYVgzkOb1VE1WQyf6E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:59Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864554417" } 2024-11-17 16:41:50,403:DEBUG:acme.client:Storing nonce: crKnBf1HP_ePYKCzYESgsSHUKjCr0QOJBcYVgzkOb1VE1WQyf6E 2024-11-17 16:41:50,403:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:41:50,410:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhQX2VQWUtDellFU2dzU0hVS2pDcjBRT0pCY1lWZ3prT2IxVkUxV1F5ZjZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcwMTY3OTcifQ", "signature": "A55c9Wo0ylhkLy53Czb6ZYST_t8gLkyDP4-IGddFxjXzQIaBBNUpB5PcADDPbMZXXzOMJmvAL7M-TVVbwmVyE17ANYahnRgyMkFOpxjafzEBqhNAsPcz0i5RR9w69-DJGydKeQEGcwH6oXL62uy_jdF8vdi68SVo7r65qJxsTOALut9le8cd0rOQFBwdIG0KFgqrJLiSZe1MjrZTiidpo3b_dqHRH-ieIo57YUgSa4Rbfx9cd0mX_bJgJ_W16jSPtHvplqxrOfGINabeVLZjcgL5ZMcnZRNHK1-kMDNs6Lg2soBMj3LCtJB1v5eZjsSjEoVvSzJ4RgZzIt8IQBsbRw", "payload": "" } 2024-11-17 16:41:50,575:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777016797 HTTP/1.1" 200 811 2024-11-17 16:41:50,576:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:44 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6njtJ9d0AizXH7VwZ_qGms_Wv1BQFfl2GL9MWxFNtYbpQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:59Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/C4H6lQ", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/uNkVbw", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/tKio5w", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" } ] } 2024-11-17 16:41:50,576:DEBUG:acme.client:Storing nonce: q3AS6Q6njtJ9d0AizXH7VwZ_qGms_Wv1BQFfl2GL9MWxFNtYbpQ 2024-11-17 16:41:50,576:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:41:50,577:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-11-17 16:41:50,577:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:41:50,577:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:41:50,578:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:41:50,578:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:41:50,579:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:41:50,579:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:41:50,580:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:41:50,634:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-17 16:41:50,855:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:41:50,856:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-17 16:41:50,857:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-17 16:41:50,862:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:15 UTC. 2024-11-17 16:41:50,862:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:41:50,862:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:41:50,867:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:41:50,868:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:41:50,868:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:41:50,873:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:41:50,874:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:41:50,876:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:41:51,364:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:41:51,365:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:45 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6bIJC4k8mc4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:41:51,366:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:41:57,331:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8650_key-certbot.pem 2024-11-17 16:42:03,271:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8648_csr-certbot.pem 2024-11-17 16:42:03,272:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:42:03,272:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:42:03,428:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:42:03,429:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1Hdvnef_MPht0lFUo6xlXAqkkbs8oLFSlnku3cxZBRNbs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:42:03,429:DEBUG:acme.client:Storing nonce: crKnBf1Hdvnef_MPht0lFUo6xlXAqkkbs8oLFSlnku3cxZBRNbs 2024-11-17 16:42:03,429:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:42:03,435:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhkdm5lZl9NUGh0MGxGVW82eGxYQXFra2JzOG9MRlNsbmt1M2N4WkJSTmJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MWr5-Mk5Bu2poWRPjp83So0Ypa_wAOogpVaQXJMXPMJ-W6-3i3JPFW3OWJoEO4PxWZ99CZMRKQrEl2VuoPbubGYXzTq-MOH7PRlY-OZm1kg8Y92fHbghPMDFm6QZGM4VFS9JeaITuVFyrZOsgEWUXYIbRtxe1Qh93sk75EaiKgEgtLPRZ9tSdyxEMt13rLnDbAnpBxDqNO8EkJ8Rl97BVHcqO1Pd3DKb2o4TxXqOHPj-qYfLhr31Diua6XXI61H5JGFcDYfpqNKxN7lVrgGzMLlAsuUg6in0VsWubcGzl3D-VCJtK-s6YKu-13OPf842veC-MC_IuhslX20_lsOcLw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-17 16:42:03,623:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-17 16:42:03,624:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:41:57 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864646067 Replay-Nonce: crKnBf1HRjnV9_2NAfcg17hZ5_c4tL_RNvuySFL_fd_n9hYdHNo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:12Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864646067" } 2024-11-17 16:42:03,624:DEBUG:acme.client:Storing nonce: crKnBf1HRjnV9_2NAfcg17hZ5_c4tL_RNvuySFL_fd_n9hYdHNo 2024-11-17 16:42:03,624:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:42:03,630:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhSam5WOV8yTkFmY2cxN2haNV9jNHRMX1JOdnV5U0ZMX2ZkX245aFlkSE5vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcxNDM2NjcifQ", "signature": "gwI9vc-ujf8_KKDD1RDEWsi2W-_10p4EqsD5SPPf4hqUgOhpW38Gqmg91uZzMKnz03nhaQa5mVkAT7AqPFosJi8rbx27-yPEwG77VjbxtugDlwu2or_vhUS_DKocyWDK4H6V9N16YGFdHNd7ehj5u671jRqZ3UuDWoszfvFl7xm37BMYrnrfcz8WGO5Qle_GpM5W5gecTal8bPLaNlQOmAY-7rxkvdOMCMIf3_eTh0HG3-aDs5zm2L51WUQJmJMXo1bKkf5Dl19qEwjO4jAmxJGtfxkhYrx_odkfSNcvGV3H1pzhpvdpFyFfWCJbVgnbKsYpu3ZMpSG6SHZ1pmdYwA", "payload": "" } 2024-11-17 16:42:03,790:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777143667 HTTP/1.1" 200 810 2024-11-17 16:42:03,790:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:58 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1H90BIem-GNYDMfhjgypDM-CNb2eBSAlC55wgGinBwXlo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:12Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/9bNT8Q", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/I07SEw", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/Ttq2kg", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" } ] } 2024-11-17 16:42:03,791:DEBUG:acme.client:Storing nonce: crKnBf1H90BIem-GNYDMfhjgypDM-CNb2eBSAlC55wgGinBwXlo 2024-11-17 16:42:03,791:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:42:03,792:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-11-17 16:42:03,792:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:42:03,792:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:42:03,793:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:42:03,793:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:42:03,793:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:42:03,794:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:42:03,795:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:42:03,844:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-17 16:42:04,168:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 513 2024-11-17 16:42:04,179:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-11-17 16:42:04,181:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-11-17 16:42:04,186:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:32 UTC. 2024-11-17 16:42:04,186:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:42:04,186:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:42:04,191:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:42:04,191:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:42:04,191:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:42:04,196:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:42:04,197:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:42:04,199:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:42:04,654:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:42:04,655:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:41:58 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "hKGOP0fZ5FY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:42:04,655:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:42:10,674:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8651_key-certbot.pem 2024-11-17 16:42:16,579:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8649_csr-certbot.pem 2024-11-17 16:42:16,580:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:42:16,580:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:42:16,731:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:42:16,731:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:42:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgX2bKpoyG0oeP98lQV4Y9OlTltOpwF2Da0tIcSrex3PNU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:42:16,732:DEBUG:acme.client:Storing nonce: usf-jMgX2bKpoyG0oeP98lQV4Y9OlTltOpwF2Da0tIcSrex3PNU 2024-11-17 16:42:16,732:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:42:16,742:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1gyYktwb3lHMG9lUDk4bFFWNFk5T2xUbHRPcHdGMkRhMHRJY1NyZXgzUE5VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZuWDbom-VZB6i_b1ee9sS6NTvo3xYYoGk-SnodpqvS-9RYbPQpKRZW2KJLW63UWes8xoRth0P5WetAOCyMAavX5MtYl5YdGP9baLC4TitcxiJntwJcytuTvRZNwDMvTJoc6CoJAp2Zvdt4_bxMBKfqpEXG7ch4oJ2FJ0PWFax-kjE7XOSjmQof8Mb54IRzFgL5hnVGE72OHquIOF9BfGPMUn_RNHKFENq39nBGehbrgnbfb103kD7u9X1duvOY_bc2DXcm0uFc5U8UDnFQI3sIbX_PG6R2Waiu1qCuod_R3Eue_rS1SNHgK9Ac6Xy1kRRRiwBElq0qg2ySvz2hc9FA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-17 16:42:16,927:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-11-17 16:42:16,928:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:42:11 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864723967 Replay-Nonce: usf-jMgXV2jP8YskjMxe1lF9W2AieTEozdY9PVV0KeRvO3BpC04 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:25Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864723967" } 2024-11-17 16:42:16,928:DEBUG:acme.client:Storing nonce: usf-jMgXV2jP8YskjMxe1lF9W2AieTEozdY9PVV0KeRvO3BpC04 2024-11-17 16:42:16,928:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:42:16,935:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hWMmpQOFlza2pNeGUxbEY5VzJBaWVURW96ZFk5UFZWMEtlUnZPM0JwQzA0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcyNTgyNzcifQ", "signature": "qJsa22Gd34JA5ZWtjfSM9Q9xXUBlxO4lg2IQeDxJwhRQBhTUAJ-GCVz2pkSzbJltKj6WXsDZGVaDowKT2dezYJuaSdwq1jQv8RNUanUc5QP3LkBTKcQ5tKv0arhKhihNFP0MOcj6F0FzGRdB5kgPE-VbETNMzUtjJsnlQH3ZgjMzgKvKI723ueyiZ-oKdhL9CkCv-JMUqF1duN6qzqXrDaXAydrCBR7pynFiMfwdsWQp2sRsZ7BsxBEWxqYGeO-leyE92_nbm6PGIErH3vuWxN6rLnr4yIi-CJGjSWoxzggoka2uF4Sb5UQCkDtfbFIYF8Na4DTFXQnaja0j4vyD8A", "payload": "" } 2024-11-17 16:42:17,092:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777258277 HTTP/1.1" 200 809 2024-11-17 16:42:17,093:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:42:11 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrT1HCvATvCX3BlgWf8OVlOVgc0zrEaV6Gn0GsDR4I5IU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:25Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/cBbQvQ", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/dLzeEg", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/GfFFvQ", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" } ] } 2024-11-17 16:42:17,093:DEBUG:acme.client:Storing nonce: JNlwFRqrT1HCvATvCX3BlgWf8OVlOVgc0zrEaV6Gn0GsDR4I5IU 2024-11-17 16:42:17,094:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:42:17,094:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-11-17 16:42:17,095:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:42:17,095:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:42:17,096:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:42:17,096:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:42:17,096:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:42:17,096:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:42:17,097:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:42:17,136:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-17 16:42:17,305:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:42:17,306:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-11-17 16:42:17,307:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-11-17 16:42:17,311:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:52 UTC. 2024-11-17 16:42:17,311:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:42:17,311:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:42:17,316:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:42:17,316:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:42:17,317:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:42:17,322:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:42:17,322:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:42:17,324:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:42:17,833:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:42:17,834:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:42:12 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "igM7DBfIh9w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:42:17,834:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:42:24,113:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8652_key-certbot.pem 2024-11-17 16:42:30,123:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8650_csr-certbot.pem 2024-11-17 16:42:30,123:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:42:30,123:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:42:30,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:42:30,287:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:42:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HOTQw6S-Q_mFGXYpu7yt4gyEciPq82sZFfrueV4Gaj6U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:42:30,287:DEBUG:acme.client:Storing nonce: crKnBf1HOTQw6S-Q_mFGXYpu7yt4gyEciPq82sZFfrueV4Gaj6U 2024-11-17 16:42:30,287:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:42:30,293:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhPVFF3NlMtUV9tRkdYWXB1N3l0NGd5RWNpUHE4MnNaRmZydWVWNEdhajZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ALxtysr4ZIl3pJg1Md6nAbOy1QlaNIzrCOmkp0YMyGMw415vFi8baTZHgOEghVXfU9crZrqMLzClTVobgmJCjV5D1SmrkQ5Urnsh5I7y3pa8Y6ij9NWuDEhs_VLOSiqBbD33oZTYRW9Z8bkT3nhZzQQ84tqcXKsCUowj6zlO9IRWRj8ohKnXCM33xvA8IeM1E45TpEzNxNEc4lsNa_hlQRPHLuriAZMcMPwdra_3vyOX65pqBC5VsjYZ-NK9exTUcMbsv3K50gbbn6QAfCj7cUnmY8EE9GG-9SQSJdKIusltX-L5xcZD5UKcY6Q8v0NzXdnljkezCoMOhxz8WKQNGw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-17 16:42:30,473:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-17 16:42:30,473:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:42:24 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864794357 Replay-Nonce: crKnBf1HoJTwNqzEUIesCGws5DZGvJNeZdFWPULdwkZEDDIvczU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:38Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864794357" } 2024-11-17 16:42:30,473:DEBUG:acme.client:Storing nonce: crKnBf1HoJTwNqzEUIesCGws5DZGvJNeZdFWPULdwkZEDDIvczU 2024-11-17 16:42:30,475:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:42:30,481:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhvSlR3TnF6RVVJZXNDR3dzNURaR3ZKTmVaZEZXUFVMZHdrWkVEREl2Y3pVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzczNjA1NTcifQ", "signature": "dM55vLyzcx2KLX74sqywwL_EIQUYVMt-44gs0Xp2cw5JpQkUFzHnl4G0ae1aGzwj8UbFovqlTf0bm-ZsuUpzN3BQc-42Y_1Pf9sylzcC2wCNPPC1Ol7THPO2l4OSJhDe1dN1KaWtNTytAY4XcAd35lESdkvNbY18O8HgAl6aEERtMvFjaDYqIMgF6GKFMQ2BpXbrVUz0-YU1ZdsTl4vrVPMCl4jWviBC7KpDpkH3bXAV-hdMA58T1M5Wm2GvfrPFvbOgl063EKz5Gy68Jaa76plUH2G6gzDJAFC2wpJSFJz1M3OYc8deegOO26UFbAskGM26ItI7CSOeZ1ePNX7YvQ", "payload": "" } 2024-11-17 16:42:30,645:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777360557 HTTP/1.1" 200 805 2024-11-17 16:42:30,646:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:42:24 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HaFNkFvFXPDcn_rGy4wuu5u6r1L30Z4cz4XVZlKhlDZQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:38Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/Ggc8vg", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/vSGH9w", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/gUrOCA", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" } ] } 2024-11-17 16:42:30,646:DEBUG:acme.client:Storing nonce: crKnBf1HaFNkFvFXPDcn_rGy4wuu5u6r1L30Z4cz4XVZlKhlDZQ 2024-11-17 16:42:30,647:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:42:30,647:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-11-17 16:42:30,648:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:42:30,648:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:42:30,649:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:42:30,649:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:42:30,649:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:42:30,649:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:42:30,651:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:42:30,695:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-17 16:42:30,998:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:42:31,000:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-17 16:42:31,000:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-17 16:42:31,006:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:10 UTC. 2024-11-17 16:42:31,006:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:42:31,006:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:42:31,011:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:42:31,012:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:42:31,012:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:42:31,026:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:42:31,027:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:42:31,030:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:42:31,517:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:42:31,518:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:42:25 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "M2qYKpTVRkA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:42:31,518:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:42:37,795:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8653_key-certbot.pem 2024-11-17 16:42:43,822:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8651_csr-certbot.pem 2024-11-17 16:42:43,822:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:42:43,822:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:42:43,986:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:42:43,986:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:42:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nYtwSHAPUAxOm5HdUOHzoJ0w1OKwZD0j0iVWSwsR4QEM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:42:43,986:DEBUG:acme.client:Storing nonce: q3AS6Q6nYtwSHAPUAxOm5HdUOHzoJ0w1OKwZD0j0iVWSwsR4QEM 2024-11-17 16:42:43,987:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:42:43,993:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5ZdHdTSEFQVUF4T201SGRVT0h6b0owdzFPS3daRDBqMGlWV1N3c1I0UUVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JmBLV83oCIPiHAh9Qk5fNgLZHSOIEpvlexY3uNylLsdgimfaDcVHi5y6oduOjV_eI8musgmJAR70Vvxfd9uO9UMO2m-tZH3b-vhBysIFNuEcMoKeBbkPlmPMw3z1tmWIPrQSPm7M2QDcwCGZFOdb-k5qDE_t6R2etjxaPX7Y19GWv_jdCcdx7FwrqD6RuUFsOQXjR1AKBtqMj7bb4eLGH3DT7WlhwxW3UYJzQa0x8QHVzPdYRZm4S1dDL0IhycXAbreauRDoLheIH2R9R-BdqVNYMLERa-AW3BCzMZKJ0dg3IqxwcYAUlURYq7wT5GGDFXcdRmO53fzm87HdTaZBLQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-17 16:42:44,189:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-17 16:42:44,190:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:42:38 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864862747 Replay-Nonce: q3AS6Q6nyErMApU98Xfydrjyfm32bK9zcKC4lONUUOKcZREfMsQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:52Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864862747" } 2024-11-17 16:42:44,190:DEBUG:acme.client:Storing nonce: q3AS6Q6nyErMApU98Xfydrjyfm32bK9zcKC4lONUUOKcZREfMsQ 2024-11-17 16:42:44,190:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:42:44,196:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm55RXJNQXBVOThYZnlkcmp5Zm0zMmJLOXpjS0M0bE9OVVVPS2NaUkVmTXNRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc0NjAwODcifQ", "signature": "IzULfGOGSZVBn6aX4lU68r10ehrw05DdbBZJzbGM1nTHD6r-gjI3qG2OuMnsCzSJQga4KHsDf-cO8Eha4r5Sn1Zfyv4kLYGHZLVlTWPp-LH517A6L7n6A0_-KDu2xCM1wrdbt2zaqDedWhsN1j9DnaU0tpbN7hPWQQ_VCVcOb0nSE-yhGvN0KfXUyo4Evpva-5x8iHSBvmIvEoHjhLi6R0EsossJCBdAh7YmWCGx_Lq4U-fKUhVsoATMTS4CD6dLn1x9bB-fHDIzSZ_xWsYjpP0Ys6Juomqg8vKZcWNLnR4AV3CMGSM8f1EIv06uDA5dCWWUcNGydbh6ocQkAtRMDw", "payload": "" } 2024-11-17 16:42:44,360:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777460087 HTTP/1.1" 200 805 2024-11-17 16:42:44,361:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:42:38 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nRxPt0iVR754zjV9Kio2w31VCNCFxTNCya6XClXQLdjw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:52Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/ASfKTA", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/tsh-iw", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/f3c_WA", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" } ] } 2024-11-17 16:42:44,361:DEBUG:acme.client:Storing nonce: q3AS6Q6nRxPt0iVR754zjV9Kio2w31VCNCFxTNCya6XClXQLdjw 2024-11-17 16:42:44,361:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:42:44,362:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-11-17 16:42:44,362:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:42:44,363:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:42:44,363:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:42:44,364:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:42:44,364:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:42:44,364:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:42:44,365:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:42:44,407:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-17 16:42:44,646:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-17 16:42:44,647:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-17 16:42:44,648:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-17 16:42:44,652:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:32 UTC. 2024-11-17 16:42:44,653:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-17 16:42:44,653:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-17 16:42:44,658:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-17 16:42:44,658:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-17 16:42:44,659:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-17 16:42:44,673:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-17 16:42:44,674:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-17 16:42:44,676:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-17 16:42:45,122:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-17 16:42:45,122:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:42:39 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_-gOBA7FPYo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-17 16:42:45,123:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-17 16:42:51,526:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8654_key-certbot.pem 2024-11-17 16:42:57,261:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8652_csr-certbot.pem 2024-11-17 16:42:57,262:DEBUG:acme.client:Requesting fresh nonce 2024-11-17 16:42:57,262:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-17 16:42:57,406:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-17 16:42:57,406:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:42:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrnXUB-mlmhwhpkvo8qzmhRQ5niRl9feBs4QBjtb5paiU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-17 16:42:57,407:DEBUG:acme.client:Storing nonce: JNlwFRqrnXUB-mlmhwhpkvo8qzmhRQ5niRl9feBs4QBjtb5paiU 2024-11-17 16:42:57,407:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-11-17 16:42:57,414:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJuWFVCLW1sbWh3aHBrdm84cXptaFJRNW5pUmw5ZmVCczRRQmp0YjVwYWlVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZHUe5js_CcYcTS-bZ3y7EDC_ynnbrVxK_zaA2tmvgZ1x2q3Dq72kGWz6TXuGSRn2xGXGNR_ELPUJoxSC8RhS-r5rnEUCcJs-MKJpJ4vNXVN6sL3gpqHSnL_nd0wk0Ulck9nkORb08OE9gn23wXWnTtOGZZXLk3MXAOkXKQ41yA4Zh-n0HACWgYXP-jEnFhHWmxux7BzueXbkM7T9q-wsjDoZtFe2wPXH2XF_6Vmq4PUGD6Yiz7-TMjEldmOTbEypHyrQ6ZW-gkn3LQ-opWckUTLyDu68E6BOSuij_euBbCTArEDZOBHvoNzdN3TKZvsGWt0WeZJltnNEaybda1cFQw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-17 16:42:57,611:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-17 16:42:57,611:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 17 Nov 2024 15:42:51 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864943797 Replay-Nonce: usf-jMgXdHkjAe61gQ292kfNeBr3A4rlymzTHJRfx3aoqL-8vt8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:03:05Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864943797" } 2024-11-17 16:42:57,611:DEBUG:acme.client:Storing nonce: usf-jMgXdHkjAe61gQ292kfNeBr3A4rlymzTHJRfx3aoqL-8vt8 2024-11-17 16:42:57,612:DEBUG:acme.client:JWS payload: b'' 2024-11-17 16:42:57,618:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hkSGtqQWU2MWdRMjkya2ZOZUJyM0E0cmx5bXpUSEpSZngzYW9xTC04dnQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc1NzIzOTcifQ", "signature": "R_l2GjEsHv_E_5jJ7tdPf6sfPJ6iWwJgcndOraIuT6YnvJ5JW_J3_YZky_Q5611MpqI-XAnz2KND02EMOF8POaEqUZmwMl9bbVbdqY1H7wMWGpBvU_TJzi2aS1Rm1L76cPwe4sK0bCp-ZZxpPF5lFDTZY-JbXjccdHOd3DgldCnKpWXZm_3Nj4tLkSSPXRlNUahZpYxRFfiVzEe_4S5pgF8ETkU836xb7HPFoUupubgrjnJ1yIuViJ1EQ5ATztK-ck1t5spn1f3wQ4-Ha4wv7dgxY-hn0IZMmoGeDFmx5lUJQwWQWv-M7KGgpd3FPhqXWMM_4NTZ8-ulOMUEaiycYA", "payload": "" } 2024-11-17 16:42:57,768:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777572397 HTTP/1.1" 200 805 2024-11-17 16:42:57,769:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 17 Nov 2024 15:42:51 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXBL_bXKCcy5X3pQF2ycNxuyvxTc28vO29q6zEl-ev8OE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:03:05Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/avR61Q", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/HIxR5w", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/qQ1QMQ", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" } ] } 2024-11-17 16:42:57,769:DEBUG:acme.client:Storing nonce: usf-jMgXBL_bXKCcy5X3pQF2ycNxuyvxTc28vO29q6zEl-ev8OE 2024-11-17 16:42:57,769:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-17 16:42:57,770:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-11-17 16:42:57,770:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-17 16:42:57,770:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-17 16:42:57,771:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:42:57,772:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-17 16:42:57,772:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-17 16:42:57,772:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-17 16:42:57,773:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-17 16:42:57,774:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-11-17 16:42:57,774:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-11-17 16:42:57,775:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-11-17 16:42:57,776:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)