2024-11-15 23:48:38,956:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-11-15 23:48:38,957:DEBUG:certbot._internal.main:Arguments: [] 2024-11-15 23:48:38,957:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-15 23:48:39,795:DEBUG:certbot._internal.log:Root logging level set at 20 2024-11-15 23:48:39,796:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-11-15 23:48:39,838:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-11-15 23:48:39,886:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 23:48:40,126:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:48:40,127:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-11-15 23:48:40,143:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-11-15 23:48:40,152:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:06 UTC. 2024-11-15 23:48:40,152:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:48:40,152:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:48:40,158:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:48:40,159:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:48:40,159:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:48:40,164:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:48:40,165:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:48:40,168:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:48:40,612:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:48:40,613:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:48:40 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Zn1bsxqMsAk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:48:40,614:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:48:47,452:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8613_key-certbot.pem 2024-11-15 23:48:53,635:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8611_csr-certbot.pem 2024-11-15 23:48:53,636:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:48:53,636:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:48:53,782:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:48:53,783:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:48:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXVxXRBzuIzhzkhoJ9jAdMrplTwaKgKqMNksVs16BXgO8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:48:53,783:DEBUG:acme.client:Storing nonce: usf-jMgXVxXRBzuIzhzkhoJ9jAdMrplTwaKgKqMNksVs16BXgO8 2024-11-15 23:48:53,783:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:48:53,789:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hWeFhSQnp1SXpoemtob0o5akFkTXJwbFR3YUtnS3FNTmtzVnMxNkJYZ084IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DgL-EmMGtfW5K4PoiRczSn3xrQw6l7UXyQXSzerYmWWJFIClA80b44D9zfvd-uxufjeDeXxfZ1aJlu5S1NpmNJ8S6cng3DVyzxWrROD6HYTyMYtWU3u94aTEIOgYfBLCNz91jyIC3ZxC59vDtpRUpTgVM0j8ayppSVgbu4CHkPlkeJrvBjpiaCWbX1F4Hd3O4zKmWBNm_0yhg6din-ZN_4E72EUW7yTIk7jX1eR8msCRYAYcONTYSAx7aCHMDBZjXHM5g62rRXoMpJvxzi5MmycuzAV0bYjmEvAu4iL7H3vvls5wd_OT0iUDGiFloVmAPyrjN2xIHndt6AB0dxvaqg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-15 23:48:53,973:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-15 23:48:53,974:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:48:54 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863894397 Replay-Nonce: usf-jMgXNQtEmYb23sChDN5jLMTxhs9Pexc3zH4NhkuBa0ja72s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:15Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863894397" } 2024-11-15 23:48:53,974:DEBUG:acme.client:Storing nonce: usf-jMgXNQtEmYb23sChDN5jLMTxhs9Pexc3zH4NhkuBa0ja72s 2024-11-15 23:48:53,974:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:48:53,980:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hOUXRFbVliMjNzQ2hETjVqTE1UeGhzOVBleGMzekg0TmhrdUJhMGphNzJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYwNjIzMTcifQ", "signature": "gF3eQcXaStGCdl0rdAMfWzbQ7IbWqaIBPu_iWAR__joAAntv5BxgOoSbjK_cxmTaZKCD0v_MqttS0FTPgvEAUpxp9p0PDaPChyZf6fNBdCQLrfkHlw7L5odSGlAArpG_C1L9SGk6ZeoslV3wfvk4OxJa6nptHk1HNNSXNaNQxBDV6X5Xq1_nQrsYjp5O2Rz5AZSuSupeIHjeJ_a0zjZBv-bgebnJ1RhdBYBirduzlkJgX76i0aJTv8UEQXQucnkW8XfqhQZKESxlgZZKfaDPyNAuXUFtm9He31nYDJigO3AUtUG9D_cPKc3B3lijZwf-NZI1W0ZHl88hcZ7c73cPQQ", "payload": "" } 2024-11-15 23:48:54,140:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776062317 HTTP/1.1" 200 810 2024-11-15 23:48:54,141:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:48:54 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqr7yXtx3esTJx2BhdhaF0fNz-0Sd1oOQRI6N9cMOXAhpw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:15Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Fppccw", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/_bn1HA", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Nohq5w", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" } ] } 2024-11-15 23:48:54,141:DEBUG:acme.client:Storing nonce: JNlwFRqr7yXtx3esTJx2BhdhaF0fNz-0Sd1oOQRI6N9cMOXAhpw 2024-11-15 23:48:54,142:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:48:54,142:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-11-15 23:48:54,143:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:48:54,143:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:48:54,145:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:48:54,146:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:48:54,146:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:48:54,146:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:48:54,151:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:48:54,197:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 23:48:54,406:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:48:54,407:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 23:48:54,408:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 23:48:54,413:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:27 UTC. 2024-11-15 23:48:54,413:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:48:54,413:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:48:54,419:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:48:54,419:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:48:54,419:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:48:54,424:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:48:54,425:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:48:54,427:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:48:54,909:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:48:54,910:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:48:54 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jHvv9SF4qlo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:48:54,910:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:49:00,669:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8614_key-certbot.pem 2024-11-15 23:49:06,186:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8612_csr-certbot.pem 2024-11-15 23:49:06,187:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:49:06,187:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:49:06,347:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:49:06,348:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6n_JJUofwnIDZohUdwM_oYqZYkqfmDVj8X-L3lldDskDs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:49:06,348:DEBUG:acme.client:Storing nonce: q3AS6Q6n_JJUofwnIDZohUdwM_oYqZYkqfmDVj8X-L3lldDskDs 2024-11-15 23:49:06,349:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:49:06,354:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5fSkpVb2Z3bklEWm9oVWR3TV9vWXFaWWtxZm1EVmo4WC1MM2xsZERza0RzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "LkE3J0ybu7RuXwN_1tjnEjtxIlebRVn1kd59VGUAFJUsTlBGenIyrm49wSwjVGz3cRjYkfy8kHAjsypsx9zs-t6YFUuXSRY4XbvVcc-hTA2JMvzArI5s3FHDWtFDA61WeTaLvLkg8IFIm5-ZV_CwEqBdmnZOxfS7Ulf1NyXX2GBJ8m0sC0VQRWHNVewfh504sAqSOCIQFna3tRdwKl5IrEa41RCGPGDEcRd-K3kxxH2QKDk5a3lXCi0tHcNHgRg00PxO_LRRyyHFGRiPNcxsEhTIHJPFWIHmWweuSrU1f5cRvAzWDh_waAfpMWAqWz3IwIbsvy7ldVYr7vKqQ7LJ0Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-15 23:49:06,604:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-11-15 23:49:06,605:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:49:06 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863990237 Replay-Nonce: q3AS6Q6nK1IPXU9UNbwKwJSyFPY_KX5HjzLxnGcBs4wOM8fGInA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:28Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863990237" } 2024-11-15 23:49:06,605:DEBUG:acme.client:Storing nonce: q3AS6Q6nK1IPXU9UNbwKwJSyFPY_KX5HjzLxnGcBs4wOM8fGInA 2024-11-15 23:49:06,606:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:49:06,612:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5LMUlQWFU5VU5id0t3SlN5RlBZX0tYNUhqekx4bkdjQnM0d09NOGZHSW5BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYxOTEyMjcifQ", "signature": "pjeLTL-oXK6b_45CEinqoUAtyGu2_mPy9wrGmOx27QAbN_J-quD37UXZOdCdoNw_j5tYkstGYhtXn8Ca6QEYL_ww95lx1fy-3s52RySkiEoUxWY90n8L0gT7XKoTiXbM8BJEieC91bm6NctLMD_DvU46UZAX2dHqosBqHyYvwdNrT_xXGE0PEqg8Hn7v7AVk6ZSSgu3I5Sf1DZIMWQ8FgfeC4oNlxUvTtgY5YQrtCqYMjCq0SuDuoRgAtWgSxh-gg-pxA_b5-8mChE_C9pYnLV76G6mB2uopef-P61sZ7PlAc7Aa9NCQUd141HzgLNLN8_J7Rw5wbVpD-BYXBeGqUg", "payload": "" } 2024-11-15 23:49:06,780:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776191227 HTTP/1.1" 200 804 2024-11-15 23:49:06,780:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:06 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HXm9As8ruusgddmLfhoYSebqLrMibg5y0ESm2W9FzigA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:28Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/tag9BQ", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/Hvp1ig", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/vZq3rg", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" } ] } 2024-11-15 23:49:06,781:DEBUG:acme.client:Storing nonce: crKnBf1HXm9As8ruusgddmLfhoYSebqLrMibg5y0ESm2W9FzigA 2024-11-15 23:49:06,781:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:49:06,782:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-11-15 23:49:06,782:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:49:06,782:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:49:06,783:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:49:06,783:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:49:06,783:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:49:06,784:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:49:06,785:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:49:06,827:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 23:49:07,092:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:49:07,093:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-15 23:49:07,094:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-15 23:49:07,099:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:47 UTC. 2024-11-15 23:49:07,099:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:49:07,099:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:49:07,105:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:49:07,105:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:49:07,105:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:49:07,110:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:49:07,111:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:49:07,113:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:49:07,579:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:49:07,580:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:07 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pVIOsJmK1D8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:49:07,580:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:49:13,656:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8615_key-certbot.pem 2024-11-15 23:49:19,168:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8613_csr-certbot.pem 2024-11-15 23:49:19,168:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:49:19,168:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:49:19,323:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:49:19,324:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nbpHtCEsmn6eD4P-vrXKGZjVzUNdpnfSOcIOG3yhkERo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:49:19,324:DEBUG:acme.client:Storing nonce: q3AS6Q6nbpHtCEsmn6eD4P-vrXKGZjVzUNdpnfSOcIOG3yhkERo 2024-11-15 23:49:19,324:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:49:19,330:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5icEh0Q0VzbW42ZUQ0UC12clhLR1pqVnpVTmRwbmZTT2NJT0czeWhrRVJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "VgZHQ4k5-Q6m5Iq3sXmwTqv70hY97jH5wjKCgiBUP5lkktYJUfI1QeAfil55B_SM_v6evh59kP3GdjrqX-wU1OA5jGEfdxx3ubs-3alt9Dyy3h2dvrHeZmA5aC5vUV8ntdgcEoK-gikZHwuzDaoLKyXyvJEijxvKYtVj2D90_EEYui_FWK1EaedUwtas2UMxyeEzZ1fh0EBOtyFHxPrGQMJvUqQ8IxHCa7r5Cyex1wkDgU4J9Ip_Bsxjc2zfoCC_ezhqWBdH2xqxIaWOlrDBqzu-mbshxkJuwzJFX6FTbj9Qy2ha5VzkfWxr3jVCAijIQHPslFAXFLcKzDx0m8c2Qw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-15 23:49:19,524:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-15 23:49:19,525:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:49:19 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864075277 Replay-Nonce: crKnBf1HaIoie3xDz9Sfoo4QIsTvD55peSaJZMAc8NfS188TH9E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:41Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864075277" } 2024-11-15 23:49:19,525:DEBUG:acme.client:Storing nonce: crKnBf1HaIoie3xDz9Sfoo4QIsTvD55peSaJZMAc8NfS188TH9E 2024-11-15 23:49:19,525:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:49:19,532:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhhSW9pZTN4RHo5U2ZvbzRRSXNUdkQ1NXBlU2FKWk1BYzhOZlMxODhUSDlFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYzMDkzMTcifQ", "signature": "h4ftjbT52LPue5w5uTzTtVF5amyxbfqxUAUY57hkijBSQYWGQhtuQaSEohN8-oVzv3JQZrVVgcd6Lj5AoqLm6or8f-K-bcxZZ6vgEoUh-xpF2UrKekAWnPhlSEewKVDgEqR4mRu_gaUBTWlEjXbXzenNpAIDGOcj_I4iPAedNJbGnnHUlq7zH22zTB9mT7cZ501sg1d8QvFBvlLabMSdNR9Cci5GcsHjrQXw2HG5xXTRwvblnkxThdiWMmlaYLR2Px5MCKlarBElnwW70U10G14z_dx7lJCleYlom8f1pRKdOkEZHlKliVpTE79vDbHwoVaPZW5Cc9W9boS0HlA2qw", "payload": "" } 2024-11-15 23:49:19,691:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776309317 HTTP/1.1" 200 807 2024-11-15 23:49:19,692:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:19 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6n6_X2VwW5v3cudfUM3bnEBQehNhg6FExHGKwbi7aydeg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:41Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/9T0aKw", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/8Wvihw", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/RhhX0A", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" } ] } 2024-11-15 23:49:19,692:DEBUG:acme.client:Storing nonce: q3AS6Q6n6_X2VwW5v3cudfUM3bnEBQehNhg6FExHGKwbi7aydeg 2024-11-15 23:49:19,693:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:49:19,693:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-11-15 23:49:19,694:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:49:19,694:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:49:19,695:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:49:19,695:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:49:19,695:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:49:19,696:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:49:19,697:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:49:19,748:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 23:49:19,966:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:49:19,968:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-11-15 23:49:19,968:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-11-15 23:49:19,972:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-11-15 23:49:19,976:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:49:20,019:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 23:49:20,216:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:49:20,217:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 23:49:20,218:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 23:49:20,223:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:08 UTC. 2024-11-15 23:49:20,224:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:49:20,224:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:49:20,229:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:49:20,230:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:49:20,230:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:49:20,233:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:49:20,234:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:49:20,236:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:49:20,714:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:49:20,715:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:20 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "l_kP7RRYgCo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:49:20,715:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:49:26,514:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8616_key-certbot.pem 2024-11-15 23:49:32,047:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8614_csr-certbot.pem 2024-11-15 23:49:32,047:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:49:32,048:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:49:32,207:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:49:32,207:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6n2Zn83gLAALPu1gKX5qMzYHBJjgC7AGE5sn1OuoUtOH0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:49:32,208:DEBUG:acme.client:Storing nonce: q3AS6Q6n2Zn83gLAALPu1gKX5qMzYHBJjgC7AGE5sn1OuoUtOH0 2024-11-15 23:49:32,208:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:49:32,214:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm4yWm44M2dMQUFMUHUxZ0tYNXFNellIQkpqZ0M3QUdFNXNuMU91b1V0T0gwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FBdcPMNqUcJeXxMKyAqY7qRolUSayxMfRurT5h1YrFtiEpUQ8rmHjRL5zvwjaP-yb3-um1v2evyWrmEBVHgWBtrWgpRlmDBFRd1XDHDv61T1r5cTkm9uVM0bkG4ojLpmPxlmztsa65kGoSkkIPFm5MsODCyk2hjYZ_1ZU2VgFBC-_YABw1vR1HdnHU2tqAEc63gv9RDHb4an-q7VvXRX0S3bmvu98UrmRTVXbOvRgfHoUag5Ar1O_Mtu-9u78ZKwlkYFgxGDd3Au3OQK26JfKlfQUNb8Gez5rakG_W011u_Dq7OdO8b5cM4LO5WayrvLfSvii0fLb_P_3-w_5ZwPbg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-15 23:49:32,389:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-11-15 23:49:32,390:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:49:32 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864158237 Replay-Nonce: crKnBf1HlrqG8RFCF6y2UbcBZNYOJBSryIb-2ky_4tetBMBBIYE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:54Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864158237" } 2024-11-15 23:49:32,390:DEBUG:acme.client:Storing nonce: crKnBf1HlrqG8RFCF6y2UbcBZNYOJBSryIb-2ky_4tetBMBBIYE 2024-11-15 23:49:32,390:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:49:32,396:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhscnFHOFJGQ0Y2eTJVYmNCWk5ZT0pCU3J5SWItMmt5XzR0ZXRCTUJCSVlFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY0MzIxMDcifQ", "signature": "n_AD4jutgBYR97Ju3vJDlJzn-K3O893sYC2-q6jEmgVcn8oA_6MN_SamfY9JS4cumBWLlLHrUV9E2qBeBw8RaNs3zYWj9faAqXD6-IIH3oAA2eSxnj4SJp1HzBz1yqjrrEm8gbSV_JiPKnI4FLry2sAbefPLnLNTtbmofKplcEjkzCbCKK7NHADkmfHTSvzo6wYldGKaSjCHFkYLCWTLGoypmNKDBoq9rLX4Es75voCpUKvKPX0Cm9MEFHKleMWzym2cDEu6pa03DHfPcMg53YVXsMoEjsIwUIet0XIfkf9OMfq7V9RJd8iueUjO0xo2QMhSYEhwGEIRh21DJdknTw", "payload": "" } 2024-11-15 23:49:32,560:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776432107 HTTP/1.1" 200 801 2024-11-15 23:49:32,561:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:32 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HIh8czkaGjdjn-Q1DxsnxH0fWh6UA8bGCxY1nWXw-Ca8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:54Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/iWIilA", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/Wk_i8A", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/U1YmAg", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" } ] } 2024-11-15 23:49:32,561:DEBUG:acme.client:Storing nonce: crKnBf1HIh8czkaGjdjn-Q1DxsnxH0fWh6UA8bGCxY1nWXw-Ca8 2024-11-15 23:49:32,561:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:49:32,562:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-11-15 23:49:32,562:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:49:32,563:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:49:32,563:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:49:32,564:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:49:32,564:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:49:32,564:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:49:32,566:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:49:32,607:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 23:49:32,904:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:49:32,905:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 23:49:32,906:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 23:49:32,911:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:27 UTC. 2024-11-15 23:49:32,911:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:49:32,912:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:49:32,917:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:49:32,917:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:49:32,917:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:49:32,922:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:49:32,923:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:49:32,925:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:49:33,362:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:49:33,362:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:33 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TX_c49d3VbA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:49:33,363:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:49:38,906:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8617_key-certbot.pem 2024-11-15 23:49:44,398:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8615_csr-certbot.pem 2024-11-15 23:49:44,398:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:49:44,399:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:49:44,545:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:49:44,546:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrkwxAPQsLdhM8DPsX3qDIElwQPVp3KmfluTSVrT54va0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:49:44,546:DEBUG:acme.client:Storing nonce: JNlwFRqrkwxAPQsLdhM8DPsX3qDIElwQPVp3KmfluTSVrT54va0 2024-11-15 23:49:44,546:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:49:44,553:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJrd3hBUFFzTGRoTThEUHNYM3FESUVsd1FQVnAzS21mbHVUU1ZyVDU0dmEwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tlDjdxRUk7rwH62ocG453JIRQSscWhaQoYK_cYEiUR1wGBuNS08At38uY85vMtPX7gbGpxv4isBMbvJ6vBxwfw3MAo0f06Jp994STu9Bw-ygt6vlV1k1LZWXnNe1V8I1UBPiyNUiE16qeIkpBbNJZLLE8PgEB0eci21qrpl8_VFN7qIz4OwgRh5MewdohjrKHohbsWfPpaXWaxj3DOPEr3o7nHUEOa_q6SJ_tN4mNfGtGZ4BKbIySjiAXBZtzxsCdg0O8tKHs5iH2kIyyHkw9qNGSyl3O7yzhFhFzfyoHCQEuOOI2QuS3ipdQBVBVZE81cuAAdtz1OSLLLr5gwc-MQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-15 23:49:44,741:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-15 23:49:44,742:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:49:44 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864248527 Replay-Nonce: usf-jMgXlMORFCxg6MECsHPOCZQs3nqq9PGRFY6e_EKh-m1T7Fc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:07Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864248527" } 2024-11-15 23:49:44,742:DEBUG:acme.client:Storing nonce: usf-jMgXlMORFCxg6MECsHPOCZQs3nqq9PGRFY6e_EKh-m1T7Fc 2024-11-15 23:49:44,742:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:49:44,748:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hsTU9SRkN4ZzZNRUNzSFBPQ1pRczNucXE5UEdSRlk2ZV9FS2gtbTFUN0ZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY1NjE2NzcifQ", "signature": "EHTzMprRU-dXtNG-jLlYkwZbAXMQyuZJjxe2VlbrYfDEH-sjjzJ5fO9gWIxV1xsiHp8KWtPxpOGy0vmJjpECz-9a0K9F2bqiFf4MKzbuFxM6wUxUGdHRB1GoxWexuBWbEsryqUKaekZZ-YSDKZBayQ52a13QazFjmNs74LS8hXgu_FtE8ln0WMlcmCIoJEebnb8PQLdiq5WDPLaG6ZfsVFTLnTTFMx6-Fm8EPhiVp7Iqa5I2jWlEvB4jDXHpLPUvHWhHKw2yD7MYAnKNvUMqqjPeW7Pnkjd1qazNPcI4cOqIrsB4y8iizFmRQsb89Ll8P-iutx6SAcl6uF_LINmH8w", "payload": "" } 2024-11-15 23:49:44,917:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776561677 HTTP/1.1" 200 805 2024-11-15 23:49:44,918:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:45 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrFLDTsIck4bE0jwzyN-DzfQwuqYi13dO-jlhtvFhTDTo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:07Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/kvNskw", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/S4Po3g", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/QOkASw", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" } ] } 2024-11-15 23:49:44,918:DEBUG:acme.client:Storing nonce: JNlwFRqrFLDTsIck4bE0jwzyN-DzfQwuqYi13dO-jlhtvFhTDTo 2024-11-15 23:49:44,919:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:49:44,919:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-11-15 23:49:44,920:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:49:44,920:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:49:44,921:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:49:44,921:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:49:44,921:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:49:44,922:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:49:44,923:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:49:44,963:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 23:49:45,146:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:49:45,147:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-15 23:49:45,148:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-15 23:49:45,153:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:58 UTC. 2024-11-15 23:49:45,153:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:49:45,154:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:49:45,159:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:49:45,159:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:49:45,159:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:49:45,164:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:49:45,164:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:49:45,167:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:49:45,646:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:49:45,647:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:45 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "J7YzKWU4nLs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:49:45,648:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:49:51,282:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8618_key-certbot.pem 2024-11-15 23:49:56,749:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8616_csr-certbot.pem 2024-11-15 23:49:56,750:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:49:56,750:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:49:56,913:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:49:56,914:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nB9kOTVS1Z2Peqf54c5JCyEjjCBvR8gMM4y2CGms-zLE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:49:56,914:DEBUG:acme.client:Storing nonce: q3AS6Q6nB9kOTVS1Z2Peqf54c5JCyEjjCBvR8gMM4y2CGms-zLE 2024-11-15 23:49:56,914:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:49:56,919:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5COWtPVFZTMVoyUGVxZjU0YzVKQ3lFampDQnZSOGdNTTR5MkNHbXMtekxFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Un9gkmWrKemrL5YgeFqBTP44qwrV3PeQx8XsQYFaIrCH8mVDTOfLwY_9uGF3wiiu4CYvrjkt021mBd_SZfVKHyL5N3bAmTnuyIvU-_aYKJ8EQkNxVBs1k-IZ_5lZVptuqAVYcCTIjVIR8AdcR-z7V71fDCsa3abTXS13f9A89QyokUYYUl1_ia8u90cVu6rN3ZBIu9Q5lEVggtxSqRVtbHTnhANaBJu_wtagfWS97HPPE0PMvEQQsaEGu3MmpXgtIPHci6wHJ149-rwh-n8r_lzZfvyiq_nsPbgxYu0JR4otvJ69K0u5B57cMaZ75_LROp1i9J6Q-18JX-sXNRM4VQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-15 23:49:57,109:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-11-15 23:49:57,110:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:49:57 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864332297 Replay-Nonce: crKnBf1HHw3VrNyc1cKHW7h9dpqucHnNa5Okian0F-bFH0QsBWg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:20Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864332297" } 2024-11-15 23:49:57,110:DEBUG:acme.client:Storing nonce: crKnBf1HHw3VrNyc1cKHW7h9dpqucHnNa5Okian0F-bFH0QsBWg 2024-11-15 23:49:57,110:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:49:57,116:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhIdzNWck55YzFjS0hXN2g5ZHBxdWNIbk5hNU9raWFuMEYtYkZIMFFzQldnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY2ODU2NTcifQ", "signature": "jNS__92UDq6Byc3Dh6qs1QbWcNxxrKdFyhIdLzRV5Mci22MggK7Vkk7BYD6PIxf9d_m6Ue_CPM0LQG_xRPsqJQ31XW0viZf2ovE2rmBeT5Y5h3ZNVAE8_-uotA3PlLjtgP7P0wIFnvpirXhQgBtnN9x2B-VxnRlYXsIvpKn18tbWw4dzogqT-HcontPmpnSMoYg8VJ_-oUam74hIAHWGZd5khk0m84oAKnzjLL_wvlIXjqcrklsFQmorKcxn4rJKF_M0tqnhkATxjxmPAx5E35WMjZf9RA5nzYM7czzTnSy50GONphKpnTDkf1DBDCItbDHbZ-9x9uRzp6F81lndeA", "payload": "" } 2024-11-15 23:49:57,282:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776685657 HTTP/1.1" 200 809 2024-11-15 23:49:57,283:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:57 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6n-2uJ_z9CX-cXFnfZJOro5uyTQw7-ENlBcg0YAOnimCs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:20Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/s3nu5w", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/DgbGnw", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/BBENhw", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" } ] } 2024-11-15 23:49:57,283:DEBUG:acme.client:Storing nonce: q3AS6Q6n-2uJ_z9CX-cXFnfZJOro5uyTQw7-ENlBcg0YAOnimCs 2024-11-15 23:49:57,284:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:49:57,284:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-11-15 23:49:57,285:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:49:57,285:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:49:57,286:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:49:57,286:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:49:57,286:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:49:57,287:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:49:57,288:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:49:57,337:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 23:49:57,594:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:49:57,595:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2024-11-15 23:49:57,596:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2024-11-15 23:49:57,600:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:15 UTC. 2024-11-15 23:49:57,600:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:49:57,601:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:49:57,606:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:49:57,606:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:49:57,606:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:49:57,612:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:49:57,612:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:49:57,615:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:49:58,094:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:49:58,101:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:49:58 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pGvQxpKbKlM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:49:58,102:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:50:03,974:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8619_key-certbot.pem 2024-11-15 23:50:09,417:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8617_csr-certbot.pem 2024-11-15 23:50:09,418:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:50:09,418:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:50:09,578:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:50:09,578:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:50:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HRtfFiERUMLHQ9FBDooK0pYH9a64VRslwVyejw0oAfYk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:50:09,578:DEBUG:acme.client:Storing nonce: crKnBf1HRtfFiERUMLHQ9FBDooK0pYH9a64VRslwVyejw0oAfYk 2024-11-15 23:50:09,578:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:50:09,585:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhSdGZGaUVSVU1MSFE5RkJEb29LMHBZSDlhNjRWUnNsd1Z5ZWp3MG9BZllrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pbP3ifKrBPGhlJ9pjmCs9qsksLshWsIN_yy7buP8dsnp4nA1RRUnnh0yFC2H-_8NqrJFAyPy_SJBWVDSEbrZqaIg_jKq-Fcw5Zy7Wwx9akqFJRACGeXUiy12_6DA11oxB5ceMgoP1_Lpp5KDKBNih1DoCmldIF70s-SiU4BA99kqKEZimKOVckAa0TwSt1j11mEPn56IM1FLKq0DKVCEhWQ8A_DMWW1zGmx9C-uEnzhyg1rioPDAQlOrSAdd7hVwNGIMLd7Irf3ymppy4ANogUREl3n8TWBUHw25yrDQIXQxNg4DpHgxyzrGBx05RJGq58qcCeVgoRLJUkTAxYKyhg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-15 23:50:09,789:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-15 23:50:09,789:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:50:09 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864408807 Replay-Nonce: crKnBf1HQDYyBeDpvXVYL4VQLT5Sh_XS2VOGFYZRO6uCEI8490o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:33Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864408807" } 2024-11-15 23:50:09,790:DEBUG:acme.client:Storing nonce: crKnBf1HQDYyBeDpvXVYL4VQLT5Sh_XS2VOGFYZRO6uCEI8490o 2024-11-15 23:50:09,790:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:50:09,796:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhRRFl5QmVEcHZYVllMNFZRTFQ1U2hfWFMyVk9HRllaUk82dUNFSTg0OTBvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY4MDA1MjcifQ", "signature": "vNjSZ-OIlPCChd33PO-FVObl9dk-B1s9axxC7nqn1UEZzbp72fTMQJSaKeRD7-3VnPN1AB6H9QTxq1rH59iKCsMAa9hjVzoODBFIkptmEl5WJaA5K81edn_lUMnhJh7j-lLHmyJ9UXFxCRyEEsF-o184tfjXFVTTnu1mo6v1naHiKbPku9MzmJzNKl7StU-T2yzLhUONCQHAN-eoV-BEXkhG10Cj977AXqTJB-n_1FdtLTHK_gVQXQVVjgy3zoHs0_AkE3SfQuQZrrBwyhzV-0n0yryO7D1oQDDP1ddT_aujy3sA_ggkEizOuMDe69jtUq4LMFrgC21BIIRTQ4KKiA", "payload": "" } 2024-11-15 23:50:09,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776800527 HTTP/1.1" 200 807 2024-11-15 23:50:09,962:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:50:10 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6n9g5bvja0tKxY1C8Ey_J53tN8f88mGsdzym4X59cxFE0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:33Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/yjXnZA", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/uHoKaA", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/B8BcEw", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" } ] } 2024-11-15 23:50:09,962:DEBUG:acme.client:Storing nonce: q3AS6Q6n9g5bvja0tKxY1C8Ey_J53tN8f88mGsdzym4X59cxFE0 2024-11-15 23:50:09,964:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:50:09,965:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-11-15 23:50:09,966:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:50:09,966:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:50:09,967:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:50:09,967:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:50:09,967:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:50:09,968:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:50:09,968:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:50:10,020:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 23:50:10,185:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:50:10,186:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 23:50:10,187:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 23:50:10,192:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:37 UTC. 2024-11-15 23:50:10,192:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:50:10,193:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:50:10,198:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:50:10,198:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:50:10,199:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:50:10,203:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:50:10,204:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:50:10,207:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:50:10,641:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:50:10,642:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:50:10 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "JnAgMz55OAs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:50:10,643:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:50:16,812:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8620_key-certbot.pem 2024-11-15 23:50:22,240:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8618_csr-certbot.pem 2024-11-15 23:50:22,240:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:50:22,240:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:50:22,388:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:50:22,389:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:50:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXn4ob09sKAQ3ewHiwJGuTcZTP8EROsQUY9rrCeSJPnM8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:50:22,389:DEBUG:acme.client:Storing nonce: usf-jMgXn4ob09sKAQ3ewHiwJGuTcZTP8EROsQUY9rrCeSJPnM8 2024-11-15 23:50:22,389:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:50:22,395:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1huNG9iMDlzS0FRM2V3SGl3Skd1VGNaVFA4RVJPc1FVWTlyckNlU0pQbk04IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "j9eT_mZ7O3yx6DvgMBysiE_hm8gQsHiaZ1g2_0NziOdQ7msCog16yOUXlK6SXBHCSKuhsRqSffZdrlu645318Z-qp1YaaZGEAZJR4vzI68yKfQM9tJbDf203rgGJU1Po5FI3fp0YsPLnQDuIPfqw3msYQDNeulLTDSvZplQyYy8ih0OpqQLH0Z3gStoFvtn23pehS7AsbD-NYVF601qhet5fDBUHTE-ZU3ZCGPZXm_qaLZRCE_I-GrkIUcQXsqoDWV3VO13VHx6U-luUcykJxhUkm6bkiiO1l1aCDyfaYlCv76Xd4NGzwihpj_Vaj6FR1s44GURUZqLNUPK9gY4rYg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-15 23:50:22,611:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-11-15 23:50:22,612:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:50:22 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864481367 Replay-Nonce: usf-jMgXZ0O4XPN-JVZRnLoWnHNIY5iRuiDNVFqAAgEexO20T_4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:46Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864481367" } 2024-11-15 23:50:22,612:DEBUG:acme.client:Storing nonce: usf-jMgXZ0O4XPN-JVZRnLoWnHNIY5iRuiDNVFqAAgEexO20T_4 2024-11-15 23:50:22,612:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:50:22,619:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1haME80WFBOLUpWWlJuTG9XbkhOSVk1aVJ1aUROVkZxQUFnRWV4TzIwVF80IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY5MDgyNjcifQ", "signature": "H1wgVRByO9k53-olUeSc6UYEbFe7VKZASsuqJ8ujO4NFX07uGohilnBt4ZpmLla73L6-qmaNM8WiBHhsBBD6Lk1020gDgC_hbD_lA8us5F6HwpNkACvuLuZAIaUiajGPOVjCuM4xRvJZvNLgxU75zHHnX39Yx-1e4TjolWF6ny0hA2tz19TkUanhMezI0SXmfGRaVuynz47cpvDZrBEcQpTQ1kjgE6GexyDUmhfSTnxVuZG8xNIyYOSoCB1cDQK1bm5ANOd14V0e2_rgCCcRa3n0H6ydw2GrxwoaUIKiNnyBOi2_Bs0GZqmuqPI1-AuP65iGL15amPR2yVtF0mWmbA", "payload": "" } 2024-11-15 23:50:22,769:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776908267 HTTP/1.1" 200 806 2024-11-15 23:50:22,770:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:50:22 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqr0v9SBNz_-noMw76TUICzpIB8ycfMBTILUDX2dBdgCOY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:46Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/PhZSOw", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/tMqdPg", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/pzyROQ", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" } ] } 2024-11-15 23:50:22,770:DEBUG:acme.client:Storing nonce: JNlwFRqr0v9SBNz_-noMw76TUICzpIB8ycfMBTILUDX2dBdgCOY 2024-11-15 23:50:22,772:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:50:22,772:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-11-15 23:50:22,773:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:50:22,773:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:50:22,774:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:50:22,774:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:50:22,774:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:50:22,775:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:50:22,776:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:50:22,815:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-11-15 23:50:22,815:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:50:22,816:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-11-15 23:50:22,822:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-11-15 23:50:22,825:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-11-15 23:50:22,825:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-11-15 23:50:22,825:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-15 23:50:22,826:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-11-15 23:50:22,827:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-15 23:50:22,870:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 23:50:23,275:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:50:23,276:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 23:50:23,277:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 23:50:23,282:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:56 UTC. 2024-11-15 23:50:23,283:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:50:23,283:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:50:23,288:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:50:23,289:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:50:23,289:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:50:23,293:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:50:23,294:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:50:23,296:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:50:23,778:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:50:23,779:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:50:23 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "yVc95P8mpko": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-15 23:50:23,780:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:50:29,566:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8621_key-certbot.pem 2024-11-15 23:50:35,062:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8619_csr-certbot.pem 2024-11-15 23:50:35,062:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:50:35,062:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:50:35,223:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:50:35,224:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:50:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nwfZ3YX--9zamBDu0PEAJur45fqSw1HIEp9pOtOL7skU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:50:35,224:DEBUG:acme.client:Storing nonce: q3AS6Q6nwfZ3YX--9zamBDu0PEAJur45fqSw1HIEp9pOtOL7skU 2024-11-15 23:50:35,224:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:50:35,231:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm53ZlozWVgtLTl6YW1CRHUwUEVBSnVyNDVmcVN3MUhJRXA5cE90T0w3c2tVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "oj6MBx7MFkUW_QA4Zg27UUKSJSWkWob7_16_rXL84BRscMr37bAnScq5TqL-dh8KC5VZcyEMp6Mx1bGOimHcJm-w1NCdGj_Kqq2vWREK1dlPFNkFHo0HCxN8aJVYDlNrCHYqLhwXbCya7dwiG1Xnr0XC5eWeIQJCrstNnZW72aqk84rb3M3-BUAP1LA2OJceWhxiPWhinzoQBOJnO1_VBSHKWJcAAkiNf4d73uoiW9gB_o9C7vdjyn2wdlYa54i1xcyrgihq1SqLeDu4gpx87qooFJQfVON0pUadch_5lVLySRXsAe_3UmmeaxTcdVD3BMt56-QxhYrlPHDTGI7Mcg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-15 23:50:35,420:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-15 23:50:35,421:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:50:35 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864554417 Replay-Nonce: crKnBf1HJxjvGhthAb4MbJ1LTg-hXBzG6KltpFdN63MepdHdDxE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:59Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864554417" } 2024-11-15 23:50:35,421:DEBUG:acme.client:Storing nonce: crKnBf1HJxjvGhthAb4MbJ1LTg-hXBzG6KltpFdN63MepdHdDxE 2024-11-15 23:50:35,421:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:50:35,428:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhKeGp2R2h0aEFiNE1iSjFMVGctaFhCekc2S2x0cEZkTjYzTWVwZEhkRHhFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcwMTY3OTcifQ", "signature": "Ms-eFM9xX86VQWg2x-Ly1KsHlIG5L_PGCtKlnt2E2Giuh4tN0ClpvrtjLe4f54jMKsmsPk9y0Gbef_DpwpmqZTwqFR4hsWUaGicl6MamVvTh4jycCyAdNzvsg4cbDgqGvOjKazFjTAlwDcR5_f9vUIA8Ykl6KCtqlyLYE8MfYCnp9_GiEuitCC8m8BwAffd_NtdtF6eLM9-Oj73KQQBFoSndDP251QV7O0BJIYMqJq1cZrll2jzng0FQdx0qf1wF9m4SlzpPyDY6MPCuvKSj_gGoISWWXD4WQXN594jwvxH-243-_PAkGhVnwhPZhKdl2X-_Z4GgKA-RZN4Wd959Fg", "payload": "" } 2024-11-15 23:50:35,594:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777016797 HTTP/1.1" 200 811 2024-11-15 23:50:35,594:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:50:35 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6n_6jnDrVB_aXXsRp9YSBQwd_HrEptcV-55ho_Pw8GeCE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:59Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/tKio5w", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/uNkVbw", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/C4H6lQ", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" } ] } 2024-11-15 23:50:35,595:DEBUG:acme.client:Storing nonce: q3AS6Q6n_6jnDrVB_aXXsRp9YSBQwd_HrEptcV-55ho_Pw8GeCE 2024-11-15 23:50:35,595:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:50:35,596:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-11-15 23:50:35,596:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:50:35,596:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:50:35,597:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:50:35,597:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:50:35,598:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:50:35,598:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:50:35,599:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:50:35,639:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 23:50:35,856:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:50:35,857:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 23:50:35,858:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 23:50:35,863:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:15 UTC. 2024-11-15 23:50:35,863:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:50:35,863:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:50:35,868:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:50:35,868:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:50:35,868:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:50:35,874:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:50:35,874:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:50:35,877:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:50:36,310:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:50:36,310:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:50:36 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "XpNfMOtTQJ8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:50:36,311:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:50:42,293:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8622_key-certbot.pem 2024-11-15 23:50:47,734:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8620_csr-certbot.pem 2024-11-15 23:50:47,734:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:50:47,734:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:50:47,880:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:50:47,881:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:50:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrXeDS4gvXFGOjA63MBlXldp2AF_j86Q60QmM3_-L1LaU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:50:47,881:DEBUG:acme.client:Storing nonce: JNlwFRqrXeDS4gvXFGOjA63MBlXldp2AF_j86Q60QmM3_-L1LaU 2024-11-15 23:50:47,881:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:50:47,889:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJYZURTNGd2WEZHT2pBNjNNQmxYbGRwMkFGX2o4NlE2MFFtTTNfLUwxTGFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Llnx-fGrVLeA_9CUIPz87PcRgh9TVV7NJIkzLY0qfnrzXY8QHfoDwHFlttP9oHi7S9gSBpHinE9kgNsRf_6Jmij8YfzMd4FZmZeptDGMBJsAFnd3Rq4cW7o0EkHtSAaNL3IjINs9_j7u8X121rCkdjMRnCtCKDboJsCNfozfiWwQmgL1HJQrJmRTafbfA2N4RO7TkJ3GSqBQVTcDrYQnONwbAhk0TaDOEO_VWcNbK6V50kYM7ORG2SoNPjPF2DR7620XUNNae9P8Z9sR_kMoRPrVdBmRkUMGoKhLa6bJqSoBIKEsVTHcRQ2TPwebWiCbPe3smncbZ6PPdXK_88-CQw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-15 23:50:48,144:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-15 23:50:48,145:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:50:48 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864646067 Replay-Nonce: usf-jMgXbyhHy_SkU_ikoFGkouPXdM2LIZ5HPij8X7oaGcEpvVc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:12Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864646067" } 2024-11-15 23:50:48,145:DEBUG:acme.client:Storing nonce: usf-jMgXbyhHy_SkU_ikoFGkouPXdM2LIZ5HPij8X7oaGcEpvVc 2024-11-15 23:50:48,145:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:50:48,151:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hieWhIeV9Ta1VfaWtvRkdrb3VQWGRNMkxJWjVIUGlqOFg3b2FHY0VwdlZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcxNDM2NjcifQ", "signature": "GDRLMO3UOeq1ZaFTGCUsJdx6x-U0jx1GjP-v06svQXh-zq_LBFipMGEooSpstJmYpJvcv4bvYKr5piHQKbDMZPLtssQErfOInWgHToL4ANGO5CX2V3B93hDI2ZvrZ4FIchTLE7FwoiJs5QYthPzGBh8XLHeGmhoHd7pc_t_tIaFk1LZk52tolsglZsaCu7S59iaal8ipWKBpokxuLav4vZ-K1PlLrTTJDSknJbWRd_jSU8yclztBAzbkc9bW0xfBkinF510w_jsSTZVJEqytLWZFbJ0zKWBYw6pF_daysAkgiqqyb2XI1dq9PjEBZyqKjYGthPM1FVtEejcThtqC1g", "payload": "" } 2024-11-15 23:50:48,317:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777143667 HTTP/1.1" 200 810 2024-11-15 23:50:48,318:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:50:48 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrqA6oGc625qZV9cl8RrbwVUvzcF6d2XxZAOncK6zqDeM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:12Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/I07SEw", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/Ttq2kg", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/9bNT8Q", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" } ] } 2024-11-15 23:50:48,318:DEBUG:acme.client:Storing nonce: JNlwFRqrqA6oGc625qZV9cl8RrbwVUvzcF6d2XxZAOncK6zqDeM 2024-11-15 23:50:48,319:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:50:48,319:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-11-15 23:50:48,319:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:50:48,320:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:50:48,321:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:50:48,321:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:50:48,321:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:50:48,321:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:50:48,322:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:50:48,372:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 23:50:48,597:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:50:48,598:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-11-15 23:50:48,598:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-11-15 23:50:48,603:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:32 UTC. 2024-11-15 23:50:48,603:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:50:48,604:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:50:48,609:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:50:48,610:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:50:48,610:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:50:48,615:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:50:48,616:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:50:48,618:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:50:49,089:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:50:49,090:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:50:49 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Cp55_u_G8Zw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:50:49,090:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:50:54,893:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8623_key-certbot.pem 2024-11-15 23:51:00,353:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8621_csr-certbot.pem 2024-11-15 23:51:00,354:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:51:00,354:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:51:00,511:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:51:00,512:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:51:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6n5XJtDxFl0o7mymVqtrIjrFMp2DMLd4CY7s8rYr52xfw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:51:00,512:DEBUG:acme.client:Storing nonce: q3AS6Q6n5XJtDxFl0o7mymVqtrIjrFMp2DMLd4CY7s8rYr52xfw 2024-11-15 23:51:00,512:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:51:00,518:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm41WEp0RHhGbDBvN215bVZxdHJJanJGTXAyRE1MZDRDWTdzOHJZcjUyeGZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vRPag5E5P-fW-agkYU1dWsnPzBTM4pcGPJKJqBAUyF2BDjrRp3qPLya2N9dpdr1C61Y2yOB0vWUP_lYQXqSxEGIPwJlN-JuTx594iKA2BTWSkisy7jx3w9UO1RpPaJiKPbEGgeSRuG9P1dTPOZ8K5yZ4dGVCkL70ueVU2o5kG4q71nRdrrYaLzdLW_02koWPoCtHceULBmWFfReRuuFjJ75JO-PEjvsnkfVaAy8KfnUXRZ7EnfSE8J058N5wIf0i7WO0eyChD-xYjyqX4B9o5e8icFgzSzN9GBIhMDCAmSAlUAM2LaJcRTPPHdeu5chCKAdeImA4scS1lMRo74y1GA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-15 23:51:00,704:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-11-15 23:51:00,705:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:51:00 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864723967 Replay-Nonce: crKnBf1Hz2f0_N-JTxglYC0RdI1ohVL4MrxsGq7DItjN6Yk1oTo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:25Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864723967" } 2024-11-15 23:51:00,705:DEBUG:acme.client:Storing nonce: crKnBf1Hz2f0_N-JTxglYC0RdI1ohVL4MrxsGq7DItjN6Yk1oTo 2024-11-15 23:51:00,705:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:51:00,711:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUh6MmYwX04tSlR4Z2xZQzBSZEkxb2hWTDRNcnhzR3E3REl0ak42WWsxb1RvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcyNTgyNzcifQ", "signature": "IwF7Jv82RJJFJz9TxzHetbClx-gbuOeJYoxRUkHboC1Y0-HR0pv_BTH2ttniQAknLhIXnIFneN2f4NVUGsSaWdd8_OFBX0gymtnc0XYlzDwpZ0iVUVaaBfVfuqkKkRG_YaD8b5HsYdzMzyXnFX9Q3GhZj5G1gqCGJ6IPJnSgVjJ2AtcBty1bM60Xifmx1ma9-uk4nCDDEo7NeIK6TOfA3pE04w8b01AUWEJWR-s4iJF40xXUVzHK6IZesfOADN4c6vDY_DEIXJzpptyR9mY5hRWu4qayXgkpWcpl4FZdZyRJjqv6lhms5ZcUtfDvVzWLonf7tcv-qoL3hpl2VCGmJA", "payload": "" } 2024-11-15 23:51:00,873:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777258277 HTTP/1.1" 200 809 2024-11-15 23:51:00,874:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:51:00 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6n-BtgzUT5UuX1syhjCP5pYLAB5pa8x4oKVzk0F7sPt4A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:25Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/dLzeEg", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/cBbQvQ", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/GfFFvQ", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" } ] } 2024-11-15 23:51:00,874:DEBUG:acme.client:Storing nonce: q3AS6Q6n-BtgzUT5UuX1syhjCP5pYLAB5pa8x4oKVzk0F7sPt4A 2024-11-15 23:51:00,875:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:51:00,875:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-11-15 23:51:00,876:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:51:00,876:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:51:00,877:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:51:00,877:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:51:00,877:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:51:00,878:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:51:00,879:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:51:00,921:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 23:51:01,244:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:51:01,245:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-11-15 23:51:01,246:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-11-15 23:51:01,251:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:52 UTC. 2024-11-15 23:51:01,251:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:51:01,252:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:51:01,257:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:51:01,258:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:51:01,258:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:51:01,263:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:51:01,264:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:51:01,266:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:51:01,748:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:51:01,749:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:51:01 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gpL-lLabsh8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:51:01,750:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:51:07,328:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8624_key-certbot.pem 2024-11-15 23:51:12,861:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8622_csr-certbot.pem 2024-11-15 23:51:12,862:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:51:12,862:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:51:13,022:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:51:13,023:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:51:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HBJcxiiaxR6Ba_PdJC_YsObEafxPddSiAFH-jatyujlw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:51:13,023:DEBUG:acme.client:Storing nonce: crKnBf1HBJcxiiaxR6Ba_PdJC_YsObEafxPddSiAFH-jatyujlw 2024-11-15 23:51:13,023:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:51:13,029:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhCSmN4aWlheFI2QmFfUGRKQ19Zc09iRWFmeFBkZFNpQUZILWphdHl1amx3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "AU3UBO0kD_Rj5HOvtJclL1iJ6dqhsqGjDK2nCyv_kFiJNApgtAtLqC2ag2l3K2m_1G7_yJE0m6BP1Qw3uCX02rUNLZw5ELLGE3n-WONgWlo2Gj5CVr_JPzUQXYrcYGmKuyjT7mRCjqoCYwx2RX6Ov6CirtWkhn_5hfph0OCr4F3nZenpiLrQJYLfIQyviG1qHEK0dgHpeckTfraOfW4BgFqKiCLbDx8EtifBjADTv1cvq0vIQWh99wEnqnT7E7g00w17s2W0pBVOlBuJ0MYukUNYM4J60tZlD23Pzxl7Xu6741bUcv_Efj8Y-M5sBFsf9Urk_rh-VFDd1YqlnJil9g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-15 23:51:13,206:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-15 23:51:13,207:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:51:13 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864794357 Replay-Nonce: q3AS6Q6nchbxjpV3FPDUe0y4_R8aCZ-JsflH14v_kRfgeKQQajE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:38Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864794357" } 2024-11-15 23:51:13,207:DEBUG:acme.client:Storing nonce: q3AS6Q6nchbxjpV3FPDUe0y4_R8aCZ-JsflH14v_kRfgeKQQajE 2024-11-15 23:51:13,207:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:51:13,213:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5jaGJ4anBWM0ZQRFVlMHk0X1I4YUNaLUpzZmxIMTR2X2tSZmdlS1FRYWpFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzczNjA1NTcifQ", "signature": "nmfFysauf27Fu4mjuXpTLRh0ZnTjiFmmwxS2FCOt183lH1hAp_X8DVaCzfVcrIlKQfHb3Xw6hEvoc-a1aRjOmMBCQYMh2UtLLaPSi8BJg2hbdIDJd7RflMMDQ3R9hwwxxvyP_FYPyi18AFo6jzFoG0U_p8vmGOtKyFaC69K1RGssv4l-Jv5uHlQzB7Q9_O5dhltrGaMFka-ZdMFgwhO_KSCvAOgQJwev5x7a8H7Lup5P436_0aLG42fhMzS5SILpmaqXtO48pF6fpomSKDq8Hr7F9f1Uo6G6d0wyC7iMvTRPXr2giJSH4J2T6aJH7tRDApUoYDJf7ZugjUcFiEHKqw", "payload": "" } 2024-11-15 23:51:13,380:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777360557 HTTP/1.1" 200 805 2024-11-15 23:51:13,381:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:51:13 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HploxHLeGBoTU7HI4pO-R9owgZ4iG5peQ4mUguYD4K8Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:38Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/vSGH9w", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/Ggc8vg", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/gUrOCA", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" } ] } 2024-11-15 23:51:13,381:DEBUG:acme.client:Storing nonce: crKnBf1HploxHLeGBoTU7HI4pO-R9owgZ4iG5peQ4mUguYD4K8Y 2024-11-15 23:51:13,381:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:51:13,382:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-11-15 23:51:13,382:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:51:13,383:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:51:13,383:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:51:13,383:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:51:13,384:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:51:13,384:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:51:13,385:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:51:13,437:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 23:51:13,632:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:51:13,633:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 23:51:13,634:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 23:51:13,639:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:10 UTC. 2024-11-15 23:51:13,639:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:51:13,640:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:51:13,645:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:51:13,646:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:51:13,646:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:51:13,651:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:51:13,652:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:51:13,654:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:51:14,132:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:51:14,133:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:51:14 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Ecc5K4u0Syg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:51:14,134:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:51:20,000:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8625_key-certbot.pem 2024-11-15 23:51:25,543:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8623_csr-certbot.pem 2024-11-15 23:51:25,544:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:51:25,544:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:51:25,704:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:51:25,705:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:51:25 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HmDCiDbNjVW2-s8ueaz3Qe6TCxk0GtBF26qWg3l-G8dQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:51:25,705:DEBUG:acme.client:Storing nonce: crKnBf1HmDCiDbNjVW2-s8ueaz3Qe6TCxk0GtBF26qWg3l-G8dQ 2024-11-15 23:51:25,705:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:51:25,713:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhtRENpRGJOalZXMi1zOHVlYXozUWU2VEN4azBHdEJGMjZxV2czbC1HOGRRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sJWL4VAjglC26z8S-8IBndJk2EkRV_uKGv86vdBGXqLcAF6OLiz78klbZxwsrdrH7g6e3RSZ185tEpIzZJJXhd2LzJpzemXFxr7iYfRkMH9AmAXXGcAUJNgsHnO92vmey0oXFKV9HkNBYraL-xze1qAsejtL7JRwbtPjSH0l1RBXJVlGP-_Up_8a_b4fwaDAWgEx0F2lGdA4k90R4JSABwR_ULBWagL9VjNMG0pko8FuZcSSlyhYs1pOt-3u4HEomdg-FZBVSxUKSjVRH9_C1Gbu_VG2MlX0uf1JlxDMRQKupGDKWW5N4YoXVsZUg8MGbtb6pDrBy9wZq6wAcsbpaQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-15 23:51:25,888:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-15 23:51:25,889:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:51:25 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864862747 Replay-Nonce: crKnBf1HbqUM9gxSkFEVh6TmtTUcg1WEemc23EMJK0tUilxBrqQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:52Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864862747" } 2024-11-15 23:51:25,889:DEBUG:acme.client:Storing nonce: crKnBf1HbqUM9gxSkFEVh6TmtTUcg1WEemc23EMJK0tUilxBrqQ 2024-11-15 23:51:25,889:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:51:25,895:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhicVVNOWd4U2tGRVZoNlRtdFRVY2cxV0VlbWMyM0VNSkswdFVpbHhCcnFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc0NjAwODcifQ", "signature": "tsoidrmIEfk1Np8Nl4A_i02XgX5JivknhIkuRfnsCAUl2Y7o6hNHBCwcfF1zuAmyEgo61_2Bua0_vkpGNJN2ImoH9suXsijSKfOTq6Wx68QZPleJKBqucbz5U11RhkXaTM6T9lMoCQoqW6j63wYU1tj-qaF2cPcsv3XqTFpPihtuPxr-h7uGfIi8uIv8IzeP4QlmqR3fKlMu3Oi5SEK5C6a6pVTSkbu20e4jC2hUxZBpaDUJPyAmuY0EBGiPjnvACcA0WVvWQbyPZ8cwBE7ROxJIlcyWPibbd528GymM7umz35aaUu8PFA_mvmmn0zaGWhV4QD_LBZFPuMCUpzrwFg", "payload": "" } 2024-11-15 23:51:26,061:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777460087 HTTP/1.1" 200 805 2024-11-15 23:51:26,062:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:51:26 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nthsg1tpKD2pAN6to-MKMHkSGNLmHjxDOw9qqAJGk5Gc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:52Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/tsh-iw", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/ASfKTA", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/f3c_WA", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" } ] } 2024-11-15 23:51:26,062:DEBUG:acme.client:Storing nonce: q3AS6Q6nthsg1tpKD2pAN6to-MKMHkSGNLmHjxDOw9qqAJGk5Gc 2024-11-15 23:51:26,063:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:51:26,063:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-11-15 23:51:26,064:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:51:26,064:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:51:26,065:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:51:26,065:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:51:26,065:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:51:26,066:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:51:26,067:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:51:26,118:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 23:51:26,353:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 23:51:26,354:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-15 23:51:26,355:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-15 23:51:26,359:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:32 UTC. 2024-11-15 23:51:26,359:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 23:51:26,360:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 23:51:26,366:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 23:51:26,366:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 23:51:26,366:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 23:51:26,371:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 23:51:26,372:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 23:51:26,375:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 23:51:26,828:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 23:51:26,828:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:51:26 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "RJFBluWIa7M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 23:51:26,829:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 23:51:32,790:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8626_key-certbot.pem 2024-11-15 23:51:38,224:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8624_csr-certbot.pem 2024-11-15 23:51:38,224:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 23:51:38,224:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 23:51:38,373:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 23:51:38,374:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:51:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXjNMTSqz3pvuBdMft-8EOAu1ulJuZ5TmFWMgN9F4bkx4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 23:51:38,374:DEBUG:acme.client:Storing nonce: usf-jMgXjNMTSqz3pvuBdMft-8EOAu1ulJuZ5TmFWMgN9F4bkx4 2024-11-15 23:51:38,374:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 23:51:38,382:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hqTk1UU3F6M3B2dUJkTWZ0LThFT0F1MXVsSnVaNVRtRldNZ045RjRia3g0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Zy2sit1jbSdUemFWZTy-arSmHTPpQlC0iiEEBXD5xTgbHabKjJYfi21u-pGFsv1LxLK95aVPrLD_O9fHzrKZz9ZADvBAFTBygDX7kuuPAH_2W3XSW8hCrjm5nplVp3Yie6G-14gFXQwyNCzGj6lV6mkBampf-OIm1sBpIL3EBM3KinRL-xy4JtsHvXx0PdolSV0sYGQrReFYG23uOdH3mcqbONErYMbknh6Pr0oWD7hjyXHFun1p8CC5PeE0COAZIgYbvthYfmFFWsOZqNHd1j15LH4IbXP9mzLls-IbUmMruw58_qugrf1RFgvz_DxL7IGDH8eGydLg-9ivkoFsRQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-15 23:51:38,552:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-15 23:51:38,552:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 22:51:38 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864943797 Replay-Nonce: JNlwFRqrN5WFQsZMWZ-d2iDMj8ZXLLR8wevzrB5h8Fbgf4gknmQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:03:05Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864943797" } 2024-11-15 23:51:38,553:DEBUG:acme.client:Storing nonce: JNlwFRqrN5WFQsZMWZ-d2iDMj8ZXLLR8wevzrB5h8Fbgf4gknmQ 2024-11-15 23:51:38,553:DEBUG:acme.client:JWS payload: b'' 2024-11-15 23:51:38,559:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJONVdGUXNaTVdaLWQyaURNajhaWExMUjh3ZXZ6ckI1aDhGYmdmNGdrbm1RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc1NzIzOTcifQ", "signature": "QEev2S4AneJzsBDq6yaXa5pGZ8fvf-KWtoQK-OGEpUX53-DF-FYJSCZtvFMoXPUwOLZJt05qzvIstmql-XIqq7h_ALh98drom116tj_KmIhcQS7FMgZ-_711emmxV16_TLrXIattDD-J3v3IWXtMPjurv4JaAK_9tYvRLUTpypwAlHdnPCMU_Lb2ZSkIkzojf7zAz6bOZbvhHeZeTnCWfkUjzkdCuwyNvnuDQRGH8G6PINilp840_sf4SYRvdnggcKqz7elOpfeGYg_afvU1p9vTj9WHS2mDqKxB-U73XxHntYN8ma3KdNO0SugeQ4dBN9xni-uYqiyvQgvV9olAVQ", "payload": "" } 2024-11-15 23:51:38,721:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777572397 HTTP/1.1" 200 805 2024-11-15 23:51:38,721:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 22:51:38 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXncT4_qM-WutZ-Xmsg9NG5J9mQQLcTHOA6-i77v1qQIU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:03:05Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/HIxR5w", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/avR61Q", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/qQ1QMQ", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" } ] } 2024-11-15 23:51:38,721:DEBUG:acme.client:Storing nonce: usf-jMgXncT4_qM-WutZ-Xmsg9NG5J9mQQLcTHOA6-i77v1qQIU 2024-11-15 23:51:38,722:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 23:51:38,722:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-11-15 23:51:38,723:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 23:51:38,723:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 23:51:38,724:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:51:38,724:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 23:51:38,724:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 23:51:38,725:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 23:51:38,726:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 23:51:38,726:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-11-15 23:51:38,727:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-11-15 23:51:38,738:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-11-15 23:51:38,739:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)