2024-11-15 17:25:27,232:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-11-15 17:25:27,233:DEBUG:certbot._internal.main:Arguments: [] 2024-11-15 17:25:27,233:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-15 17:25:28,058:DEBUG:certbot._internal.log:Root logging level set at 20 2024-11-15 17:25:28,058:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-11-15 17:25:28,101:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-11-15 17:25:28,147:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 17:25:28,451:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:25:28,453:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-11-15 17:25:28,457:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-11-15 17:25:28,466:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:06 UTC. 2024-11-15 17:25:28,466:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:25:28,466:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:25:28,472:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:25:28,472:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:25:28,472:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:25:28,479:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:25:28,480:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:25:28,482:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:25:28,974:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:25:28,975:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:25:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HyXekZ89T10": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 17:25:28,976:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:25:35,473:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8599_key-certbot.pem 2024-11-15 17:25:41,698:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8597_csr-certbot.pem 2024-11-15 17:25:41,698:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:25:41,698:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:25:41,859:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:25:41,859:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:25:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nNPE3Yd7wfGKIR0MYFw-tK3wMiWUOgHPF5O7aS4d9PIU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:25:41,859:DEBUG:acme.client:Storing nonce: q3AS6Q6nNPE3Yd7wfGKIR0MYFw-tK3wMiWUOgHPF5O7aS4d9PIU 2024-11-15 17:25:41,860:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:25:41,865:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5OUEUzWWQ3d2ZHS0lSME1ZRnctdEszd01pV1VPZ0hQRjVPN2FTNGQ5UElVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "j6LJrTXX9WW22MeP8mbpiIe-choWWcdddg32CJvDJJlpPeYctQn9mfTgEb8Cx1giQSIeXU_30fh8tdq_i76EAyPqZGSMNNZMke6TPjyezefjSjuxfR9ZebuT0RP1FzVhfXmDLP6nHCpncLL5fM1zF5NKvDl_SCTxrKVJ1hbH1Emul0bg2Xdz5cqCcLaabIyBEVQNrabbHanTsKQfUWj6I-MVDPxmHhEK75uVkL3KlRFcafnpkWNyEa52PZ5wCEXdU9h6Lpow9WUBLk_kol5xCw4HBShUPZM2bfJh2DuGA1uDtQxQAYLkQWHQEewxcjDPeT4Kv4u__3pThupIoNn6Ng", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-15 17:25:42,058:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-15 17:25:42,059:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:25:42 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863894397 Replay-Nonce: crKnBf1HYo33ViUohD8n2E0p6iiQhQgR5yHqd2El0276js2Dctw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:15Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863894397" } 2024-11-15 17:25:42,059:DEBUG:acme.client:Storing nonce: crKnBf1HYo33ViUohD8n2E0p6iiQhQgR5yHqd2El0276js2Dctw 2024-11-15 17:25:42,059:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:25:42,066:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhZbzMzVmlVb2hEOG4yRTBwNmlpUWhRZ1I1eUhxZDJFbDAyNzZqczJEY3R3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYwNjIzMTcifQ", "signature": "Dal_UJSDB9WeQV5y4txNuxFckL6UY24SIZPjbgyEzg-hlqDn6llJY6PcCIW94hVEZxh3R3zjjr9ZIrJfVRHHR-DhGOrIHXbvn4utD53VXCaij0O_DTydc8pILhnOa-FjMEpvYI3b-WPk8d0OrIfuahSViVRhYu8JbkLCDeL6_WV83cy0iWOS868Jtm3P6bHE-Esr0-k0jXqvcnWGwQqlZVs_RrgCOGDAk3k50jkJZPr3nBXqAyjYTF0MABltJomMy6nosClSzfIFavuq0yTGFpPaGJ8tYhim3SoZwEaGWNqlvHqZY75Gw8ISTFMF-jU4nrSUgL5WEd_Y5utUx753hg", "payload": "" } 2024-11-15 17:25:42,233:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776062317 HTTP/1.1" 200 810 2024-11-15 17:25:42,233:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:25:42 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nRGFyRvvaKUZcMQSp5oDEIgvIevAefl_QacRySc4R1z8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:15Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Fppccw", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Nohq5w", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/_bn1HA", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" } ] } 2024-11-15 17:25:42,234:DEBUG:acme.client:Storing nonce: q3AS6Q6nRGFyRvvaKUZcMQSp5oDEIgvIevAefl_QacRySc4R1z8 2024-11-15 17:25:42,234:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:25:42,235:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-11-15 17:25:42,246:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:25:42,246:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:25:42,251:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:25:42,251:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:25:42,251:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:25:42,252:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:25:42,257:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:25:42,299:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 17:25:42,500:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:25:42,501:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 17:25:42,502:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 17:25:42,507:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:27 UTC. 2024-11-15 17:25:42,507:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:25:42,508:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:25:42,512:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:25:42,512:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:25:42,513:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:25:42,529:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:25:42,530:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:25:42,532:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:25:43,014:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:25:43,015:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:25:43 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jcivj-OwvWA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 17:25:43,015:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:25:49,238:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8600_key-certbot.pem 2024-11-15 17:25:55,169:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8598_csr-certbot.pem 2024-11-15 17:25:55,169:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:25:55,169:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:25:55,333:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:25:55,333:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:25:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HYyliq_g7h31Wzefb-nCJTLyBs3AYHvRmPJDB4s1oezc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:25:55,334:DEBUG:acme.client:Storing nonce: crKnBf1HYyliq_g7h31Wzefb-nCJTLyBs3AYHvRmPJDB4s1oezc 2024-11-15 17:25:55,334:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:25:55,341:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhZeWxpcV9nN2gzMVd6ZWZiLW5DSlRMeUJzM0FZSHZSbVBKREI0czFvZXpjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KaC8XyuJhWPwyOT54qxXhNKyoefXCNwVJaDSCDVKB89M6qH0tVx0fbUSQjTdxlJel4nM8n-0m9bcCptqlkeKvtg7DuPgGK1NGG8w5ZiYo9mhtlQlsDvKFH8DAMu-V10m-37_1LMuRlYZ6VYKTPqU82Mt0dikc7qOF-8M6Jdp48jKe5cFRQ4l9oMPv14IlDNCCiGWMf4GVhemVoH7AETeOZJ4MpfwWpF0nGAkHeZJFoGKFkDI3grHo8nvJaekBBMCA9d9qGPn0FSC--RSTGIX-tevoFq3TNdT6ZgZDlobdCV4aQA15Ip71mEBMNJMMY7IUZHfOAanEBdMyabDxd-jow", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-15 17:25:55,543:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-11-15 17:25:55,544:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:25:55 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863990237 Replay-Nonce: crKnBf1HK6WI5AtRCLV851YFxwxWgGRpm7SXxrr54wmeyrrEYo0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:28Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863990237" } 2024-11-15 17:25:55,544:DEBUG:acme.client:Storing nonce: crKnBf1HK6WI5AtRCLV851YFxwxWgGRpm7SXxrr54wmeyrrEYo0 2024-11-15 17:25:55,544:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:25:55,550:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhLNldJNUF0UkNMVjg1MVlGeHd4V2dHUnBtN1NYeHJyNTR3bWV5cnJFWW8wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYxOTEyMjcifQ", "signature": "LYFd4XaLcToVZTn9z7gcjxp6F6A5m7O3eh7Tp5c3RKnlKotYdWak-esS3ORQCSFNnO14rxo6SYwxLjTsN54lReSYa9nZlCPiEI4wWgCbCe0-Ym2mYe7l2BrQ7MzxYwgnT9TCX8J6hd2FmO1ftmZPwC3UWu2fBol_ANz4zrDjRi9yFsYW98SL7QmwdixJJ6yezgtJAsZGHYejsFN8rAOYyTjD3NiP4cS1NxNeeNp8x6VeMad6snKmSkoGZRbqvHyQ8BE_zkZVur__9ZvFsD5Pqq4TBUvxSMh1ipBgNf348nIPFVPiFsu5gKbTbhEmnalI7NEDLcBdYOZW0R5omVw9Fw", "payload": "" } 2024-11-15 17:25:55,716:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776191227 HTTP/1.1" 200 804 2024-11-15 17:25:55,717:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:25:55 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HUf3UZVl_5_kkKg5JRJN5L7lsta9XJ8oYZA3nBZt2rag X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:28Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/tag9BQ", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/Hvp1ig", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/vZq3rg", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" } ] } 2024-11-15 17:25:55,717:DEBUG:acme.client:Storing nonce: crKnBf1HUf3UZVl_5_kkKg5JRJN5L7lsta9XJ8oYZA3nBZt2rag 2024-11-15 17:25:55,717:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:25:55,718:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-11-15 17:25:55,718:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:25:55,719:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:25:55,719:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:25:55,720:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:25:55,720:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:25:55,720:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:25:55,721:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:25:55,764:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 17:25:55,996:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:25:55,998:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-15 17:25:55,998:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-15 17:25:56,003:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:47 UTC. 2024-11-15 17:25:56,004:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:25:56,004:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:25:56,009:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:25:56,010:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:25:56,010:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:25:56,014:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:25:56,015:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:25:56,017:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:25:56,465:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:25:56,465:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:25:56 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gBV6RhlUFxM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 17:25:56,466:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:26:02,429:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8601_key-certbot.pem 2024-11-15 17:26:08,454:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8599_csr-certbot.pem 2024-11-15 17:26:08,455:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:26:08,455:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:26:08,605:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:26:08,605:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:26:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXBA5qTaxfBWJkzEVvGwX6lYFjvXHARE5rDw_KH5JBC2o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:26:08,606:DEBUG:acme.client:Storing nonce: usf-jMgXBA5qTaxfBWJkzEVvGwX6lYFjvXHARE5rDw_KH5JBC2o 2024-11-15 17:26:08,606:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:26:08,612:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hCQTVxVGF4ZkJXSmt6RVZ2R3dYNmxZRmp2WEhBUkU1ckR3X0tINUpCQzJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mFxoXZZlNar_GjlSpH4Fr8arN9-r6Z0vaqL7gXdtWdkADAh1SHJzKkrxUHcqDNBA5Jsr-wNMxqh-eCdV45MjTWLQagf5P1UZSu5mF-5XCAdwq-aw1j1Jn4fbBTRjUOg0Uah_-d9bLcmhh9gaT36_OSEMQhvPH7buxLbmVQsrxjoIAkQIxz-tFRwLq3QJQmE27u3U9FMoqLpWuo84P-Z-tt8ktUNZN5IhidwTPIN9h1j3Iqc9kLE00CA5R8fsCDE9sLg0DEmJTOa0nJ8pNHSaooIX8k9WaIkLvEzUO9j76iN4AXND-C63W1Wiht59JjaNhglH91QIwUa7i22iWexCYg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-15 17:26:08,854:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-15 17:26:08,855:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:26:08 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864075277 Replay-Nonce: usf-jMgXwJDggQmuLz9RMPQXJ7X3aTJHJl89AqJYHSrFqwUBc2I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:41Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864075277" } 2024-11-15 17:26:08,855:DEBUG:acme.client:Storing nonce: usf-jMgXwJDggQmuLz9RMPQXJ7X3aTJHJl89AqJYHSrFqwUBc2I 2024-11-15 17:26:08,855:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:26:08,861:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1h3SkRnZ1FtdUx6OVJNUFFYSjdYM2FUSkhKbDg5QXFKWUhTckZxd1VCYzJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYzMDkzMTcifQ", "signature": "Ch2BRWJ9pyWNHuxwylmm6_IswfpJCUOz5WIa5G-GzT2q3qKor-whUG18FP4q6Rf272KdCY42zUAySupPgcIoRUgI1-M5zKGXJ4kqumjvNF-8bHHZnIKl5EmBUPdZsUfn3z6hlid0gCSs7MHVZyT6H_gCoFZa2XHoP0nLXomQxrdAu0ioOUTJRT1r7bcJ8BombGWHiURkD1zf-jWWHsIEHDjYyRmljm5rCEeLJLD2BV5qRlgegTTJIzeMrvJ5bDUiYCIgMItgVI-74HEXX6cwQop4JpS4RWCxZIzAIsGui4Y1jrGmGnB5sZEliLIAK2CwHni0IrEiLtsGmAGORrsVGw", "payload": "" } 2024-11-15 17:26:09,024:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776309317 HTTP/1.1" 200 807 2024-11-15 17:26:09,025:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:26:09 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXk1ArzPJTV4QEYd-ysGVt7hLAbTZu7BAu96gbodMSse0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:41Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/9T0aKw", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/8Wvihw", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/RhhX0A", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" } ] } 2024-11-15 17:26:09,025:DEBUG:acme.client:Storing nonce: usf-jMgXk1ArzPJTV4QEYd-ysGVt7hLAbTZu7BAu96gbodMSse0 2024-11-15 17:26:09,025:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:26:09,026:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-11-15 17:26:09,026:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:26:09,027:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:26:09,027:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:26:09,028:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:26:09,028:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:26:09,028:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:26:09,029:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:26:09,070:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 17:26:09,227:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:26:09,228:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-11-15 17:26:09,229:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-11-15 17:26:09,233:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-11-15 17:26:09,236:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:26:09,278:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 17:26:09,470:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:26:09,471:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 17:26:09,472:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 17:26:09,477:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:08 UTC. 2024-11-15 17:26:09,477:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:26:09,477:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:26:09,483:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:26:09,483:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:26:09,483:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:26:09,499:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:26:09,500:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:26:09,502:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:26:09,954:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:26:09,955:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:26:10 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "zFHe8YI6CSI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-15 17:26:09,956:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:26:16,488:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8602_key-certbot.pem 2024-11-15 17:26:22,432:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8600_csr-certbot.pem 2024-11-15 17:26:22,433:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:26:22,433:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:26:22,583:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:26:22,583:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:26:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXnEXsuWo2BlG-un3EC2wspH3b2dz_Whir9CpTyGZufjk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:26:22,584:DEBUG:acme.client:Storing nonce: usf-jMgXnEXsuWo2BlG-un3EC2wspH3b2dz_Whir9CpTyGZufjk 2024-11-15 17:26:22,584:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:26:22,590:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1huRVhzdVdvMkJsRy11bjNFQzJ3c3BIM2IyZHpfV2hpcjlDcFR5R1p1ZmprIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vFC8tov1esDxZ9wUVKRMcidQgdqrgmIayUQx19JhgP6X69QXyErPFKE37bFlHjfDjt1b4bvKW3e-cfxDx-SprsoZ_xYAZo9ajR0YhyaDzLs2hNLYx9Bl463_qVB0n2ek2rGTiSNbu4V6SnmVA6UOh05advlPvVCk8d9igqMXk97j3bN0PStgIhWLgIDiEsx88-9ezhyynMphTAlxukjl5ot1Hz4nuzOnjUsE1ksixtcikxUjKcWrcFRt_o7FsQEuhQDbzRjNbgNKGpf90oycX__krUquqCUf7FXAebH9D6UXfaJG4h__Y-7uSZNF7MLLneINVyKUoaZUQ03STR1Ozw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-15 17:26:22,777:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-11-15 17:26:22,777:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:26:22 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864158237 Replay-Nonce: JNlwFRqr6k_ofkNcll-Jb5_uCeQcXWVQhfoPjZuLe8TkoGh83y0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:54Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864158237" } 2024-11-15 17:26:22,777:DEBUG:acme.client:Storing nonce: JNlwFRqr6k_ofkNcll-Jb5_uCeQcXWVQhfoPjZuLe8TkoGh83y0 2024-11-15 17:26:22,778:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:26:22,783:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXI2a19vZmtOY2xsLUpiNV91Q2VRY1hXVlFoZm9Qalp1TGU4VGtvR2g4M3kwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY0MzIxMDcifQ", "signature": "jZACNNjhFZyhr0-rOTKMh1guRqmWdFxjBOFutXJZr4P4za-ZnyN3Y_vauAqTNM8aLGajgz_AlF6M2-CmuwKnArd5MSj10Jx5nc8PpVcZyfe0UL0dM0T_MhBlOUzzHTQH2yvOgfEc9vlI9-5ckhe_Dcpdxn4xWcZBjUa1PrkdBIh4TeAmm_1yS6iB6eTa7Hzae7WWVRmBT4IbLWf-c1bdxLBSvY8lvpGKO1Y5FY5ZbW9O48sPs-9OUpQlqPQRj1CbrpXHaeFdYA6ASl0pez5EwvscTTbeAiLqNRd2oF9QsLeojo6GqNCgXMpkceI5tK51F3qcZQDjGqNvAMCaSXjOhg", "payload": "" } 2024-11-15 17:26:22,940:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776432107 HTTP/1.1" 200 801 2024-11-15 17:26:22,941:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:26:22 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrzpvCpA7CEIG6uJMvwvSZt6aRUKG1bq5hlowHZXGRUVo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:54Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/iWIilA", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/U1YmAg", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/Wk_i8A", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" } ] } 2024-11-15 17:26:22,941:DEBUG:acme.client:Storing nonce: JNlwFRqrzpvCpA7CEIG6uJMvwvSZt6aRUKG1bq5hlowHZXGRUVo 2024-11-15 17:26:22,942:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:26:22,942:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-11-15 17:26:22,943:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:26:22,943:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:26:22,943:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:26:22,944:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:26:22,944:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:26:22,944:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:26:22,946:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:26:22,987:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 17:26:23,185:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:26:23,187:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 17:26:23,187:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 17:26:23,193:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:27 UTC. 2024-11-15 17:26:23,193:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:26:23,193:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:26:23,198:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:26:23,199:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:26:23,199:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:26:23,204:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:26:23,205:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:26:23,207:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:26:23,645:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:26:23,646:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:26:23 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NZ5Mq-9nHc0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 17:26:23,647:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:26:29,859:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8603_key-certbot.pem 2024-11-15 17:26:35,531:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8601_csr-certbot.pem 2024-11-15 17:26:35,532:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:26:35,532:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:26:35,678:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:26:35,678:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:26:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXm0QkdeNnMoLMSC8DP21kerVTF_dyjTZllBGomd953wA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:26:35,679:DEBUG:acme.client:Storing nonce: usf-jMgXm0QkdeNnMoLMSC8DP21kerVTF_dyjTZllBGomd953wA 2024-11-15 17:26:35,679:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:26:35,685:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1htMFFrZGVObk1vTE1TQzhEUDIxa2VyVlRGX2R5alRabGxCR29tZDk1M3dBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MHGJWlvZXGWrRKskHgkyOip3OjGuu8vdTHb9Ys-lggj5KctqtPS7LrTIplQXOe98Letclw4awTg9v-adQgpulVmzAvwegyz93QfnUruD195hRzn6xhkgF1BS_Z07M4ZiZCrK2NuZCar5oUKXgfxvGxiXQk3JTqIlZi8OBjv27cp7b6dD7_dFMwzy1Q25iNS0CyQ6Lc7ZNpk_8rWf8dZWgKqYMGjL0tkP-G-esoroFdvWV1kNtFSUAEyinqAJGOg6VnJ3m56gj-P0nZce32TFCQ5lk_6QzrtidtXYWlBcqiwVyfFP1npT35Cvp6i5ZXj6weg6pTb-8r3oA-Pts52ONQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-15 17:26:35,871:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-15 17:26:35,872:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:26:35 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864248527 Replay-Nonce: usf-jMgXWBp1KxEuPymbrK5vObROy7BBV-J-inMzU75Mu25W4-Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:07Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864248527" } 2024-11-15 17:26:35,872:DEBUG:acme.client:Storing nonce: usf-jMgXWBp1KxEuPymbrK5vObROy7BBV-J-inMzU75Mu25W4-Y 2024-11-15 17:26:35,872:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:26:35,878:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hXQnAxS3hFdVB5bWJySzV2T2JST3k3QkJWLUotaW5NelU3NU11MjVXNC1ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY1NjE2NzcifQ", "signature": "aFPf_4U0mWrgmAj68-szB20r26C0m4g0HVCoXQyeqQagzrDuzqtRkHUbWqPhiPxDRv_MoCQkS6NMl54fXZT8GECkQXThwumWSpj_yfwlTH_aG6FvoyJCWRBhfR-_kp7FBRKIfupa_r5BYDQUxI_QMbaP_5cQFu0bI-f66ZsI6KtzKmBBIydfCVoL-rwBcHHxPCPOeSi-OctHAu9-aM01Rq3uQ_GsNNo613CJ9sA7-5kQGmxR-PEgRO4ySIgJ6DEfmr7Erw3oOzLuX9jbnX4XCYQW5NjZ8KvH6tasR6jQRA-RRIUZFa1eKV73CCrsHouFW4edcZ7O7_Xv0LDIllHWiw", "payload": "" } 2024-11-15 17:26:36,032:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776561677 HTTP/1.1" 200 805 2024-11-15 17:26:36,032:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:26:36 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrCFBgbx6IZbZ-FtPtLdqN3yScH4RxW0CxSC5NslFe4TI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:07Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/S4Po3g", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/kvNskw", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/QOkASw", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" } ] } 2024-11-15 17:26:36,033:DEBUG:acme.client:Storing nonce: JNlwFRqrCFBgbx6IZbZ-FtPtLdqN3yScH4RxW0CxSC5NslFe4TI 2024-11-15 17:26:36,033:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:26:36,034:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-11-15 17:26:36,034:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:26:36,034:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:26:36,035:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:26:36,035:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:26:36,035:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:26:36,036:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:26:36,037:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:26:36,089:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 17:26:36,340:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:26:36,341:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-15 17:26:36,342:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-15 17:26:36,346:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:58 UTC. 2024-11-15 17:26:36,346:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:26:36,347:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:26:36,352:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:26:36,352:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:26:36,352:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:26:36,357:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:26:36,358:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:26:36,360:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:26:36,829:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:26:36,829:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:26:36 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5KlkxzKfFt8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 17:26:36,830:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:26:42,852:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8604_key-certbot.pem 2024-11-15 17:26:48,544:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8602_csr-certbot.pem 2024-11-15 17:26:48,544:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:26:48,544:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:26:48,701:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:26:48,702:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:26:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HC7nrQhOqsCeBOMHvSn14Hrw6wV1Ivs-0tbTChSg0yJM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:26:48,702:DEBUG:acme.client:Storing nonce: crKnBf1HC7nrQhOqsCeBOMHvSn14Hrw6wV1Ivs-0tbTChSg0yJM 2024-11-15 17:26:48,702:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:26:48,708:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhDN25yUWhPcXNDZUJPTUh2U24xNEhydzZ3VjFJdnMtMHRiVENoU2cweUpNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Aj0QQvz9alCoutkDeSmSUCejKSm-on7QiUTTrwXnTzRObG9hHKPtqU9-JDIlssaXzXinzeDxKg9lS0C-vUhX9iCUhyLCS-wtlrhuva1pMkUh754BvUJtnZv5KBTo_MkGUyLhoMWHR1v33Rb8IoZrvYSInmsvrncZRCBYi_ySisGWTcb8owL6eT7exAjOqJNlEC_4qkZqHGJ9QFyxS0kGfhLFztsRrBgjY0XwwkB4tunXx3gnTlMXZ1w72OdW8kDnVtf8Ssp8aN5SvILIm85cN4AcxfsPGGA9_puiBNcj2bfhf3VLmJXXq0Mn-DmBqLwNvtdbznTdEmyTPpsMzm_sjw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-15 17:26:48,902:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-11-15 17:26:48,902:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:26:48 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864332297 Replay-Nonce: crKnBf1HEZ5RBKFTT4sdyvz17_jVAIDBcXdwK3xKOgblwS9TFaw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:20Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864332297" } 2024-11-15 17:26:48,903:DEBUG:acme.client:Storing nonce: crKnBf1HEZ5RBKFTT4sdyvz17_jVAIDBcXdwK3xKOgblwS9TFaw 2024-11-15 17:26:48,903:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:26:48,909:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhFWjVSQktGVFQ0c2R5dnoxN19qVkFJREJjWGR3SzN4S09nYmx3UzlURmF3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY2ODU2NTcifQ", "signature": "wszyNOLy5j-jxZfNvjQ6y-WfBMKEYfS8cwjRCiJoqPCfxavLazm8bGS0YUqxmlu2_zdEwakmeQ9JvCpMnHggYxfYgSUcv0r7Nf-UFrWYT_F9nDwXoF0blOgZ0t3aozPB68pvvoWh1869o9qaHMCyAQrGS5i2J0gBfLHqLU_okY0fPlZbQNTdMZvE9X4gPN_1Oa-UE3aZPXfTbizzSnPA_0G3bH2n3zxFwnXStm23KYd5XtQveIIS32AIRgqEXWDQlgM2b2odLic80rtuB3lHx4aPA9UBGMMDsriZx0rY4pyYtvnoyQlTvg8DUUVXog1TM_oCxVx8IHG9vTuppNp9NQ", "payload": "" } 2024-11-15 17:26:49,071:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776685657 HTTP/1.1" 200 809 2024-11-15 17:26:49,071:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:26:49 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1Hs1TB37XYGzcq6ywvHBnt-_IiFUW_bCBHrdtnsEZGl_E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:20Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/BBENhw", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/s3nu5w", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/DgbGnw", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" } ] } 2024-11-15 17:26:49,072:DEBUG:acme.client:Storing nonce: crKnBf1Hs1TB37XYGzcq6ywvHBnt-_IiFUW_bCBHrdtnsEZGl_E 2024-11-15 17:26:49,074:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:26:49,074:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-11-15 17:26:49,075:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:26:49,075:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:26:49,076:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:26:49,076:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:26:49,076:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:26:49,076:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:26:49,078:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:26:49,116:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 17:26:49,329:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:26:49,331:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2024-11-15 17:26:49,331:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2024-11-15 17:26:49,335:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:15 UTC. 2024-11-15 17:26:49,335:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:26:49,336:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:26:49,341:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:26:49,341:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:26:49,341:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:26:49,357:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:26:49,358:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:26:49,361:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:26:49,826:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:26:49,826:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:26:49 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "kW4KoaJmzms": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 17:26:49,827:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:26:55,943:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8605_key-certbot.pem 2024-11-15 17:27:01,670:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8603_csr-certbot.pem 2024-11-15 17:27:01,670:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:27:01,670:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:27:01,825:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:27:01,826:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrwJG6rb81hoxYVdgIywuGXiBcA8lPgqTFacKTzdhQt1g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:27:01,826:DEBUG:acme.client:Storing nonce: JNlwFRqrwJG6rb81hoxYVdgIywuGXiBcA8lPgqTFacKTzdhQt1g 2024-11-15 17:27:01,826:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:27:01,831:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJ3Skc2cmI4MWhveFlWZGdJeXd1R1hpQmNBOGxQZ3FURmFjS1R6ZGhRdDFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Z5HTbE561msOPlQWeZky_M-X0Ec7CTKh7LhhNQvHTEwCmggVOmKLUfM73TSQvH-IKgFsYYkvCGn-B0EbSl_TMV6Jcb3ae6CCzkxfkib2DbijDuEbh7jotE9aLVdQ7oyPRM9HwlRqisZ__M3Gx_z-RfKeChmPt1az5zjakXIwAGqXrbS2uOmgh_XOuQK8QMy8oHP7gSpQ9VCcgQ66akV-fyMbyMu6Uh8e4KddsHrIdkHGTPm2CM78AVEwj1YqUqiDazfgDo-3QgMawWHoSsb3jf-ZWeoAT8sO1jqaQZHcrrLc117o_C1FmNTZsy6d2cgY7P9hilfPqz1zodexwYvflw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-15 17:27:02,038:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-15 17:27:02,039:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:27:02 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864408807 Replay-Nonce: JNlwFRqr7VGqyApVrE2ZlgDufk2Ay2l8xTJJasrrek_Ap__y3c0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:33Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864408807" } 2024-11-15 17:27:02,039:DEBUG:acme.client:Storing nonce: JNlwFRqr7VGqyApVrE2ZlgDufk2Ay2l8xTJJasrrek_Ap__y3c0 2024-11-15 17:27:02,039:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:27:02,044:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXI3VkdxeUFwVnJFMlpsZ0R1ZmsyQXkybDh4VEpKYXNycmVrX0FwX195M2MwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY4MDA1MjcifQ", "signature": "kycU9uPOShFIP3HxDQglPiEbQzN2NIpZFRxmFsx3RFKfDFOPVUA3JNXnH0T3TvrX1vTnRN7oVAfRyFDxJGotKyjUbvSTAkGanvdA4yEMj033kMwrFoD4GRHvjFxH1jCN_idwIEweBwlOSEphVLqb4gfxfpz88Tdl0CMfUBM3kr4kQc2iJvKKXA7CLjXki4NvXSWRFGxEh7rmoL_NhyjWl5jk0fkm0SZcJdXvjayl6yWJ8BYwq00rNaVy8hqEdCeg55XMfI3DCxMuIHEdj2FYYpYPZecY3AWacvbedCJ11LbRq1XOPWxz-jjosf0A9oSdhi5Z7I0gEnPPwKBgYbLg5g", "payload": "" } 2024-11-15 17:27:02,204:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776800527 HTTP/1.1" 200 807 2024-11-15 17:27:02,205:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:02 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrKpaP9ooYNOoB9HzEh2AoIE0UiklniRkxLqgLwBN9z_U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:33Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/yjXnZA", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/B8BcEw", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/uHoKaA", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" } ] } 2024-11-15 17:27:02,205:DEBUG:acme.client:Storing nonce: JNlwFRqrKpaP9ooYNOoB9HzEh2AoIE0UiklniRkxLqgLwBN9z_U 2024-11-15 17:27:02,207:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:27:02,207:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-11-15 17:27:02,208:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:27:02,208:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:27:02,209:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:27:02,209:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:27:02,209:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:27:02,210:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:27:02,211:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:27:02,262:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 17:27:02,454:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:27:02,455:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 17:27:02,455:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 17:27:02,460:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:37 UTC. 2024-11-15 17:27:02,460:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:27:02,461:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:27:02,466:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:27:02,466:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:27:02,467:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:27:02,482:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:27:02,483:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:27:02,485:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:27:02,933:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:27:02,934:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:02 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "y5oFb0YA4yU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-15 17:27:02,934:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:27:08,812:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8606_key-certbot.pem 2024-11-15 17:27:14,830:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8604_csr-certbot.pem 2024-11-15 17:27:14,830:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:27:14,830:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:27:14,980:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:27:14,980:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXCSJP4VBI9MGocU0tMdvLVLO2JDXp9bzr8SUs8OPNnP4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:27:14,980:DEBUG:acme.client:Storing nonce: usf-jMgXCSJP4VBI9MGocU0tMdvLVLO2JDXp9bzr8SUs8OPNnP4 2024-11-15 17:27:14,981:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:27:14,986:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hDU0pQNFZCSTlNR29jVTB0TWR2TFZMTzJKRFhwOWJ6cjhTVXM4T1BOblA0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "RDuRtTZM_euHbowh4tdXv1K290275xrBtvCGRrU7nBsxcqjvKR_DPbITRNTnA9O5VRpxX2rjm1vSPYWEM2spH7uMvuiwXcCpfsVd7_9XWJnHfwyQM7lZHTnjaoVG4MRl2GBGApB2J0kD0e4Leit43963TFSurRKGeP98bzGfotL5llQU5qcNjIxbaPp9U_ZgSlSf-cvFBOqLV8p31_XYPsrylkoBimzGC63UyOXMdWWQvL3txqO2CmdaXkUKQEzbX8Yy8l2pjwwgOKQjChzbFqzSpJQJ26wmlItowJeIKYPOOoT_WqtAAS92BXgISmma8XRpSfGFsbgDPjW2YfRUyw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-15 17:27:15,167:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-11-15 17:27:15,168:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:27:15 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864481367 Replay-Nonce: JNlwFRqrz0DoAz-PpNbrvkwMyCin20nj-um7QQHLSBu_N00VMwE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:46Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864481367" } 2024-11-15 17:27:15,168:DEBUG:acme.client:Storing nonce: JNlwFRqrz0DoAz-PpNbrvkwMyCin20nj-um7QQHLSBu_N00VMwE 2024-11-15 17:27:15,168:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:27:15,174:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJ6MERvQXotUHBOYnJ2a3dNeUNpbjIwbmotdW03UVFITFNCdV9OMDBWTXdFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY5MDgyNjcifQ", "signature": "qAvhFtVVD1zV00kY3divQ5wcDLuN8ySFbJ69NLlj3wgqI2S8YwU67vf9g9EZnQJcRmIq2bi0U691hRRAHl3syhqv0VyYnOZFGg3RHrepnyXcZF9rzZqkhHBMLDEn34_CITOBhLOhr5_M0mpNsmwg-nIF7ck8F1ab91fXZTp3HTosJhRuWYV_XWavwaAF_ispwBUmGQy_Mt2IE3hEetr_U-aZR4InIKo0Pc3ZJ5v7yjr1lC2LzfsG47GewU4CTl0MGQDUlPXpac1qRGzEusKmXl9pAfma06cCJAS9OqpXl_lTlZLU-xtVMFhO6UpjXCoNnLjw7Cv0pNhjX4kXUVJWkw", "payload": "" } 2024-11-15 17:27:15,329:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776908267 HTTP/1.1" 200 806 2024-11-15 17:27:15,329:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:15 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXqbyvhJGtnf8t9_NOMYjFd1lP25z2feBoQaBPtoJim3c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:46Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/PhZSOw", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/tMqdPg", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/pzyROQ", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" } ] } 2024-11-15 17:27:15,330:DEBUG:acme.client:Storing nonce: usf-jMgXqbyvhJGtnf8t9_NOMYjFd1lP25z2feBoQaBPtoJim3c 2024-11-15 17:27:15,332:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:27:15,332:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-11-15 17:27:15,332:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:27:15,333:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:27:15,334:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:27:15,334:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:27:15,334:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:27:15,335:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:27:15,336:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:27:15,374:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-11-15 17:27:15,375:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:27:15,375:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-11-15 17:27:15,383:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-11-15 17:27:15,385:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-11-15 17:27:15,385:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-11-15 17:27:15,386:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-15 17:27:15,386:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-11-15 17:27:15,388:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-15 17:27:15,432:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 17:27:15,651:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:27:15,653:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 17:27:15,653:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 17:27:15,659:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:56 UTC. 2024-11-15 17:27:15,659:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:27:15,659:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:27:15,665:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:27:15,665:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:27:15,665:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:27:15,681:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:27:15,682:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:27:15,684:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:27:16,135:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:27:16,136:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:16 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "xEU45pAVMq0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-15 17:27:16,136:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:27:22,482:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8607_key-certbot.pem 2024-11-15 17:27:28,431:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8605_csr-certbot.pem 2024-11-15 17:27:28,432:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:27:28,432:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:27:28,583:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:27:28,583:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXTLTxhm83-Ai29KtoFzGIg-OaOBTNKgkWuW7zy9wLtsU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:27:28,583:DEBUG:acme.client:Storing nonce: usf-jMgXTLTxhm83-Ai29KtoFzGIg-OaOBTNKgkWuW7zy9wLtsU 2024-11-15 17:27:28,584:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:27:28,590:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hUTFR4aG04My1BaTI5S3RvRnpHSWctT2FPQlROS2drV3VXN3p5OXdMdHNVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "E7cphRiG3fcL6rKu0PzOwC7cNHquHDjlRuoBaCmcsYY5jFJxQWNnb84xxQEvGaeWO1vwIWVlKZK5hhlCT59xoHiA_1ZbXAmybNQQ6w0wlraN3whLZm-zOJHO-OLJNRRvmSJXFbdcc5hLQEJS0i58xCVqN2IjWWl1JLzGFrAdvnsX71cHK-TT-JvJ2ouBCNM8V6bSZK2Fy0oipj6thdqG06T0X8xaCuBJvsxvpeJMHyMaP5RSMhrCxwp2eViqeBP4psU880-Vv_tqgJdj5d4e3AC-lI7pWF8YpdZMolhyxdYrZfPcZ0agbhkvAXPONRGMhTxsqo_EuVw6DAiUfBSYSg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-15 17:27:28,795:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-15 17:27:28,796:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:27:28 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864554417 Replay-Nonce: usf-jMgX8lixgQPP8HMIyPVMlVoRmJvjn6S_Ac5pX_WS8xuXSGU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:59Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864554417" } 2024-11-15 17:27:28,796:DEBUG:acme.client:Storing nonce: usf-jMgX8lixgQPP8HMIyPVMlVoRmJvjn6S_Ac5pX_WS8xuXSGU 2024-11-15 17:27:28,796:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:27:28,803:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1g4bGl4Z1FQUDhITUl5UFZNbFZvUm1KdmpuNlNfQWM1cFhfV1M4eHVYU0dVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcwMTY3OTcifQ", "signature": "OzZZbIWQv7oyFjR0b3BN1y8vG0XFlX5nCDb0n6LniWv_GqIpLXr99jH6dfiAe2SVhl-pPVHUI6xEV5FPy3ooV2Kzh5CIOvzWEHMK3v39WmgeCBxNgSIa7nWjjrYJgYWLCc9V16TqBj1Y4NhbkKdToKAIvhOdht3do7Rl-PN63yClYoQadVc8nD1omGV7d1uGl9XtjTC1pG035VK0IVW9q9zLl3c0v6WnL-ag0tnauR1KSYbjMjl_7SHlIXQiVfJ9w7svLnxiotAGh_SwUurk_qUNNU2I2x-GbsSHneBuw6npu_dh0XlzqVXA-jZpOhrff_IZcl5VjJWoapbAbkIaUQ", "payload": "" } 2024-11-15 17:27:28,958:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777016797 HTTP/1.1" 200 811 2024-11-15 17:27:28,959:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:29 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrGz9x_tR6LtkI0wxuE7wz-Wm357OiDFzFU90a-AoPHKo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:59Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/C4H6lQ", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/uNkVbw", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/tKio5w", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" } ] } 2024-11-15 17:27:28,959:DEBUG:acme.client:Storing nonce: JNlwFRqrGz9x_tR6LtkI0wxuE7wz-Wm357OiDFzFU90a-AoPHKo 2024-11-15 17:27:28,959:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:27:28,959:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-11-15 17:27:28,960:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:27:28,960:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:27:28,961:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:27:28,961:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:27:28,961:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:27:28,962:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:27:28,963:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:27:29,015:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 17:27:29,214:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:27:29,215:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 17:27:29,216:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 17:27:29,221:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:15 UTC. 2024-11-15 17:27:29,221:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:27:29,222:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:27:29,227:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:27:29,227:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:27:29,227:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:27:29,233:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:27:29,234:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:27:29,235:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:27:29,703:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:27:29,704:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CzA7zlcUb98": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 17:27:29,704:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:27:36,323:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8608_key-certbot.pem 2024-11-15 17:27:42,303:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8606_csr-certbot.pem 2024-11-15 17:27:42,303:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:27:42,303:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:27:42,460:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:27:42,461:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:42 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nPMdEWNVCU6vw4PNcCAAa0bWJt76xXyjRd3V-b2mHixM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:27:42,461:DEBUG:acme.client:Storing nonce: q3AS6Q6nPMdEWNVCU6vw4PNcCAAa0bWJt76xXyjRd3V-b2mHixM 2024-11-15 17:27:42,461:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:27:42,468:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5QTWRFV05WQ1U2dnc0UE5jQ0FBYTBiV0p0NzZ4WHlqUmQzVi1iMm1IaXhNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nbohKDCa72SyRXzfOLybrm_bR092xE8HltI3sKZ7yoRdo7PokMVK6JaC5Dc9hxiSce4ojXdvSvdJ6ELRB6vjrlyQnF9hBYUEAQ2ypTv6eOJMBeVf4EdntMBjWGUZqPaePqVUDIvK4nctlhu0Iawp1UR43KnRBAbU5S4uM1JQBQuoFcYltXpEFnDiQ8azwH1moKvr4GzBlHWniIoI_YU0IH1HI4uKM65H4f2NzFyn688B3kmz4_kFE5DhPMlkGyqt5ctoTKTSGY-IjgHnj7U1E-flDMn_woVyC5egeY2JVH9k-Lu3rq-qwZtopy9TPC5TNecwSWla11L-BX8VXNGG5w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-15 17:27:42,654:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-15 17:27:42,654:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:27:42 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864646067 Replay-Nonce: q3AS6Q6nsDQEUhTzJEjBtefIdRKN0Yj8MdCravKyFCNnSLO0rOg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:12Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864646067" } 2024-11-15 17:27:42,655:DEBUG:acme.client:Storing nonce: q3AS6Q6nsDQEUhTzJEjBtefIdRKN0Yj8MdCravKyFCNnSLO0rOg 2024-11-15 17:27:42,655:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:27:42,661:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5zRFFFVWhUekpFakJ0ZWZJZFJLTjBZajhNZENyYXZLeUZDTm5TTE8wck9nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcxNDM2NjcifQ", "signature": "iUl-rgw2OQl159PkJPhm8ualRN3NzF86EjCHX7lq6NUkLUPZiALSyYBQh-mYaUPSRjROrXGr7GlfNq938IwjFnb25BV2Z5nCJDLiu6zDijvMaGVaCnJinD4c_TE3urjdwwHGJNICWvGy_pIFhU1JyiUt1v6JRtWF33bKx9FDgRoFr9nkfDuBG5lKB9cVJw5W5OoqQ5U8E-te8ksGtldav_qf8ZI84bwfAFYJNAvV9_rcrCGFEVyHqifb5KDzxuvMfz37EwDIxEqHY2stqzNUR1MY8atzSLmf2ORHWtN4LBK2ItOVPNDiFkI4EuXACEZ34-QemIDcMn1Jr6-3flqccg", "payload": "" } 2024-11-15 17:27:42,835:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777143667 HTTP/1.1" 200 810 2024-11-15 17:27:42,835:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:42 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HzD0H4r_Ftq72tsSnvFPY13mMx1D6e_R2HjIZ1y9EgSs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:12Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/I07SEw", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/9bNT8Q", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/Ttq2kg", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" } ] } 2024-11-15 17:27:42,835:DEBUG:acme.client:Storing nonce: crKnBf1HzD0H4r_Ftq72tsSnvFPY13mMx1D6e_R2HjIZ1y9EgSs 2024-11-15 17:27:42,836:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:27:42,836:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-11-15 17:27:42,837:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:27:42,837:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:27:42,838:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:27:42,838:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:27:42,838:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:27:42,839:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:27:42,840:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:27:42,894:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-15 17:27:43,178:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:27:43,179:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-11-15 17:27:43,180:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-11-15 17:27:43,184:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:32 UTC. 2024-11-15 17:27:43,184:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:27:43,185:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:27:43,190:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:27:43,190:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:27:43,190:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:27:43,196:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:27:43,197:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:27:43,199:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:27:43,668:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:27:43,668:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:43 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "RStV-XSVIf8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 17:27:43,669:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:27:49,919:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8609_key-certbot.pem 2024-11-15 17:27:55,877:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8607_csr-certbot.pem 2024-11-15 17:27:55,878:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:27:55,878:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:27:56,034:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:27:56,034:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1HjcTL0O8tzmJD5xhf0p_Wqg9pp514u1gsuHqgxzA10vI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:27:56,035:DEBUG:acme.client:Storing nonce: crKnBf1HjcTL0O8tzmJD5xhf0p_Wqg9pp514u1gsuHqgxzA10vI 2024-11-15 17:27:56,035:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:27:56,040:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhqY1RMME84dHptSkQ1eGhmMHBfV3FnOXBwNTE0dTFnc3VIcWd4ekExMHZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "e59IXIiakdIAnkT9y1HZlovk5o36lmeoLFBbqxSvH_ZUXNlXm8Vl4Q7knRrIzPm7I-hsEK1xn9epumA5WYywt7sH1R1zEZUF3cV-HU_vhr0EHOAaLxopD3BzO9I4-QOsCwPDeYGXhFlz_Nze3vIA8EuOb9yx3rEbr74rxDuNKJPco72TrOC0MRi4pt3oNGbnjeFyIjdO0AdxuTBrAlgb6QHHZc2t40j9wYB7RupsEBBeuwYtWjcPA5Ix8alci7n5haeU7LSXcl4EbdVTMKoArA9a1Siw8JyfFg1SBWfnGfhJcxJEcGeeALlZDCHuTo5hwWcp6qlMGyeRVEs1RIeBrA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-15 17:27:56,238:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-11-15 17:27:56,239:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:27:56 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864723967 Replay-Nonce: crKnBf1HQUcAW--X6wmr42HYEesAbTxNcGLE1HwLNaiYQac3Fqk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:25Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864723967" } 2024-11-15 17:27:56,239:DEBUG:acme.client:Storing nonce: crKnBf1HQUcAW--X6wmr42HYEesAbTxNcGLE1HwLNaiYQac3Fqk 2024-11-15 17:27:56,239:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:27:56,245:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUhRVWNBVy0tWDZ3bXI0MkhZRWVzQWJUeE5jR0xFMUh3TE5haVlRYWMzRnFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcyNTgyNzcifQ", "signature": "gIO_FZSZ8bx6VqANxyI6ZiK6dxmUAnME6pJCKrfSvUsdBNyhaufg_5irND-Vw7AzD_7ed3Wn1nY7Ze4_oDkid99z-vjD_NwZElYIZW2Fr8XJWFGO_X79P6P9eIKvxGGO35LEOXENnKPHDPZY7Qr7apoxvS2WONgWrgOCGIbrNSsVkWufinmGr9tBuFLueJLuggMqtjYmOg0qat4AQx1blTVFnJxKG2tilAgLol7Xq36mFVeBpwAJ6DjIrtCEokCEZGoEJrSBRydLvXDF5CWnNbY5K1B9RM9EmEUykfJC8_vzVVh2VgLtCWPS2Ee4OmckB4yEx1nJ6-_i0C2k9Orpqg", "payload": "" } 2024-11-15 17:27:56,408:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777258277 HTTP/1.1" 200 809 2024-11-15 17:27:56,408:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:56 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6n-n_9B4Q-Rm3P_2DsQ-uczPeE5uZV_3o_59P8rTXrHoI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:25Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/GfFFvQ", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/cBbQvQ", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/dLzeEg", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" } ] } 2024-11-15 17:27:56,409:DEBUG:acme.client:Storing nonce: q3AS6Q6n-n_9B4Q-Rm3P_2DsQ-uczPeE5uZV_3o_59P8rTXrHoI 2024-11-15 17:27:56,409:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:27:56,410:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-11-15 17:27:56,410:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:27:56,411:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:27:56,411:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:27:56,411:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:27:56,412:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:27:56,412:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:27:56,413:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:27:56,466:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 17:27:56,643:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:27:56,645:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-11-15 17:27:56,646:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-11-15 17:27:56,650:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:52 UTC. 2024-11-15 17:27:56,651:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:27:56,651:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:27:56,657:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:27:56,657:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:27:56,657:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:27:56,662:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:27:56,663:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:27:56,665:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:27:57,147:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:27:57,148:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:27:57 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Ie3W2yNgtJo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 17:27:57,149:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:28:03,173:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8610_key-certbot.pem 2024-11-15 17:28:09,073:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8608_csr-certbot.pem 2024-11-15 17:28:09,073:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:28:09,074:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:28:09,235:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:28:09,235:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:28:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nhlA5n8yo7jLqF0M4fD7RGYooyZGB658pvxEDrWxTnqQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:28:09,235:DEBUG:acme.client:Storing nonce: q3AS6Q6nhlA5n8yo7jLqF0M4fD7RGYooyZGB658pvxEDrWxTnqQ 2024-11-15 17:28:09,236:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:28:09,242:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5obEE1bjh5bzdqTHFGME00ZkQ3UkdZb295WkdCNjU4cHZ4RURyV3hUbnFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tpbINWtAtKaVtrI3Uya60FREujXj2Vgo_LLdVIY5gAoidIA6TOi1uxYAylyXq3EhoBY-IdkJ3cpduM0DjAqah1x1hBiB7u7t-H7HNk4WL0gN2PcksGq3JD-5N7SUBlB5QGPQXmc894jh7itEC4P5t98CJnIBoDZBjQoD3ii-xi4ItZewD_quUIlk_5xMaI4N6NPQ1P8PhmrWdePOwuwHzcUBGqewHj3yt48tzF6aL6J8D_a-uYbmoFEXTVObLs-Y7VJgECuXxmYSctwxUtZrLf3p6FXOCWGPdX9rcOIouds2ulgUYzEVQWknPhR5VGC3uX3PWY_QyGmBobjErnc0xw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-15 17:28:09,418:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-15 17:28:09,419:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:28:09 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864794357 Replay-Nonce: q3AS6Q6n797JBcLtJkTWcqy7H6sKWn0-eik8bXRYW71cGHhlipA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:38Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864794357" } 2024-11-15 17:28:09,419:DEBUG:acme.client:Storing nonce: q3AS6Q6n797JBcLtJkTWcqy7H6sKWn0-eik8bXRYW71cGHhlipA 2024-11-15 17:28:09,420:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:28:09,426:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm43OTdKQmNMdEprVFdjcXk3SDZzS1duMC1laWs4YlhSWVc3MWNHSGhsaXBBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzczNjA1NTcifQ", "signature": "DYL_MMsmmzHAd8UEwZ9EEWIwnsOumRh_NpM2_udCOAyAT7m26J-Uh9k1ZCYTs5XXtksNmMZws2O2yyYhrb5KD97WxlWObUBCEz7H2lI7gc3Jng3dBQ3L5ptAbWOJQfkueVx3jSeaHzhN3lhsGcwiT2Bc7tGDoibIlziDFD7rO8mjg0qdgApkTjEGwv6aZFDNFFsDLtEAvWDwKB4bJKTRYxVKWeO6PAinFm8yH298m2REjQoxTQuhs7NG9opIaYoSuVDWT8qVQzG4krduBTu9C3qwpqUZQf_wD3KkKGO7Uh9-JOv2qfIXJPD4BcKz11HF1VyxrfDVTd7W0Z1WcYlZsg", "payload": "" } 2024-11-15 17:28:09,599:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777360557 HTTP/1.1" 200 805 2024-11-15 17:28:09,600:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:28:09 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: crKnBf1Hbz_hu7Ou-8BcPaXNfuh6CyDUajh9xbX5JLqpyJGY6yY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:38Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/vSGH9w", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/gUrOCA", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/Ggc8vg", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" } ] } 2024-11-15 17:28:09,600:DEBUG:acme.client:Storing nonce: crKnBf1Hbz_hu7Ou-8BcPaXNfuh6CyDUajh9xbX5JLqpyJGY6yY 2024-11-15 17:28:09,600:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:28:09,600:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-11-15 17:28:09,601:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:28:09,601:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:28:09,602:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:28:09,602:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:28:09,602:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:28:09,603:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:28:09,604:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:28:09,644:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 17:28:09,869:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:28:09,870:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-15 17:28:09,871:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-15 17:28:09,876:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:10 UTC. 2024-11-15 17:28:09,876:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:28:09,877:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:28:09,882:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:28:09,882:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:28:09,882:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:28:09,887:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:28:09,888:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:28:09,890:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:28:10,381:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:28:10,382:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:28:10 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "A6-Vaq7Vp2c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 17:28:10,382:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:28:17,145:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8611_key-certbot.pem 2024-11-15 17:28:23,185:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8609_csr-certbot.pem 2024-11-15 17:28:23,186:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:28:23,186:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:28:23,347:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:28:23,348:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:28:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nY13TfJmIb7BXA6MjqcC0O2A-cQkeIZbnK_cYEUbP2N0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:28:23,348:DEBUG:acme.client:Storing nonce: q3AS6Q6nY13TfJmIb7BXA6MjqcC0O2A-cQkeIZbnK_cYEUbP2N0 2024-11-15 17:28:23,348:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:28:23,356:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicTNBUzZRNm5ZMTNUZkptSWI3QlhBNk1qcWNDME8yQS1jUWtlSVpibktfY1lFVWJQMk4wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mpF9Ma6jpNxEvF18nA7qO69P6mAMpM71eWR5z1o-IWjrNrnLithIfks5Qg1kHsHwCoeRVaq5nOgnAS7ZzgFJn083CDIX99M3_95MLtxhJNbyBH5fWoFuTSVurH_fqbAtYoWmZeNDa0BFuVWyENRtl97SUJxM4ZZ-Ija9YK9ybVaLFO0XJNlkxesbTIQG6uYRxZlvqrc9Rsa6r6g9Etr-_Wf3B8sQpFxrdsHAvNeIkQPTdSL_4-LwKM7dR2UBaUlXbvE0EehYO7J9KTzFo9lUjOrZAc1ZMItKtuj5wg-AEGOsbl5fGGN1hfzlB-0IxmfcQQA7pauzv300O0RA8gwn5Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-15 17:28:23,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-15 17:28:23,608:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:28:23 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864862747 Replay-Nonce: crKnBf1Ht0pseN115jlp6YZW2N8qyFM7x281fNrPNmunbsK52bE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:52Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864862747" } 2024-11-15 17:28:23,608:DEBUG:acme.client:Storing nonce: crKnBf1Ht0pseN115jlp6YZW2N8qyFM7x281fNrPNmunbsK52bE 2024-11-15 17:28:23,609:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:28:23,615:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiY3JLbkJmMUh0MHBzZU4xMTVqbHA2WVpXMk44cXlGTTd4MjgxZk5yUE5tdW5ic0s1MmJFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc0NjAwODcifQ", "signature": "cjIYK29pwWmr1XB7265an1yaz2WHfIy39Kv5IKEbmHGH2grjaPFVRlcitkdJef9_DHT1CMf0bifAWpaLw7U6lepL96PGjRcd6ETX4fOtnp7YTIEk-V_xoMQEyWVSsOWdcJf6OXRqeN5t-VeIVIeMMLi4iNPH81IJgNr4AGeSFtFHjwl0zlw87QPQaHkAR6ptbl0-sdQrz8ui-sEivTqky22Ka6hmJuSbt8-utRfa_0DYx-Pqh6tPHib3PyWMx5eh6Z8Br5LK6G-7jvR1RBqhd_CBCFxeF-aYzBEZFGNG--ZP9xny4gv5OsCD28L2urbyRJijQk57to9spUtKD7QTYw", "payload": "" } 2024-11-15 17:28:23,781:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777460087 HTTP/1.1" 200 805 2024-11-15 17:28:23,781:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:28:23 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: q3AS6Q6nwvKr_5OvMqAvIKVqvnSbGNhWyAmbYrT4g1jcx-GLICc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:52Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/ASfKTA", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/tsh-iw", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/f3c_WA", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" } ] } 2024-11-15 17:28:23,782:DEBUG:acme.client:Storing nonce: q3AS6Q6nwvKr_5OvMqAvIKVqvnSbGNhWyAmbYrT4g1jcx-GLICc 2024-11-15 17:28:23,782:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:28:23,783:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-11-15 17:28:23,783:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:28:23,783:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:28:23,784:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:28:23,784:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:28:23,785:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:28:23,785:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:28:23,786:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:28:23,838:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-15 17:28:24,089:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-15 17:28:24,091:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-15 17:28:24,091:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-15 17:28:24,096:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:32 UTC. 2024-11-15 17:28:24,096:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-15 17:28:24,096:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-15 17:28:24,102:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-15 17:28:24,102:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-15 17:28:24,102:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-15 17:28:24,107:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-15 17:28:24,108:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-15 17:28:24,110:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-15 17:28:24,546:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-15 17:28:24,546:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:28:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "2mgyuvtrEiw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-15 17:28:24,547:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-15 17:28:31,184:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8612_key-certbot.pem 2024-11-15 17:28:37,444:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8610_csr-certbot.pem 2024-11-15 17:28:37,444:DEBUG:acme.client:Requesting fresh nonce 2024-11-15 17:28:37,445:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-15 17:28:37,589:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-15 17:28:37,590:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:28:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrQOb8R2qmCuUfPeGrms2rBZjEjtq1Xp86xeJRMVZCssc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-15 17:28:37,590:DEBUG:acme.client:Storing nonce: JNlwFRqrQOb8R2qmCuUfPeGrms2rBZjEjtq1Xp86xeJRMVZCssc 2024-11-15 17:28:37,590:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-11-15 17:28:37,597:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSk5sd0ZScXJRT2I4UjJxbUN1VWZQZUdybXMyckJaakVqdHExWHA4NnhlSlJNVlpDc3NjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "GcE2HWrgFZ5CJ_DM4MNuHZqzAbruQtIsjoUmpppR_hcpOpgaBTs0T8DjgCPkVgXhxbhwFHWJDjNNi0njiwd4UzJOOznmU8nXNzj20_t6BXuGJEDqQVJLUsoPEew-b8hlCt8c36HpQxdEcWiYBVRlfXfRXxM9sv8Xcn68wylZvgZn2fS8XPCjBj4wlqWKeKegRqzZDdLXN3cqSKTExqKqhNLj_ZfFix4mqIIcwLe8zJOgY7-YJ5LymwzZspEBvfJP5yB5b9b2ooXWjas4n0bmod3zKEpD3SU7a20BV-WBjb8yFdW8HUf-9_M7v_MLisIo_ikTGN4gxmqU8HLgayIckg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-15 17:28:37,756:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-15 17:28:37,756:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 15 Nov 2024 16:28:37 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864943797 Replay-Nonce: usf-jMgXrL19pENNR5UrHPUn8TlPjQV3-FKLmkmEAYnPkPB7yRA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:03:05Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864943797" } 2024-11-15 17:28:37,757:DEBUG:acme.client:Storing nonce: usf-jMgXrL19pENNR5UrHPUn8TlPjQV3-FKLmkmEAYnPkPB7yRA 2024-11-15 17:28:37,757:DEBUG:acme.client:JWS payload: b'' 2024-11-15 17:28:37,763:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXNmLWpNZ1hyTDE5cEVOTlI1VXJIUFVuOFRsUGpRVjMtRktMbWttRUFZblBrUEI3eVJBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc1NzIzOTcifQ", "signature": "ntQFQrHSHJFoM8TfDL7c5Mgtj3LLGbtVtlmJxkhh0TFLY25h8Gna3IwPKMDc4u_3a7E4wPH_74IpcElSY6bstWWJESKDEe-6KAh0G2Tg1v4J3yr9qAN4xpvQXlU7nhhyzyBu-zwI8KAjbWsED1WArdbMbmC9-517RyB-i3vwIgGL5VGvGx8tJJ8RmTRGwdKuRunEe5Q5SZTKvoNYfcRGj7Q3ykd_aav79RTEzAlpP08wHH3OqUkgNSuKFnEGQMTmsBV6A6-kPnADsUhg-KpJwv4HK_73zpkQ8pXFbzUKo5Cv0tmP1zcOLmWEMcv9be3zAdcbQZ_MlXY1fmJUm2tKfg", "payload": "" } 2024-11-15 17:28:37,916:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777572397 HTTP/1.1" 200 805 2024-11-15 17:28:37,917:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 15 Nov 2024 16:28:37 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXyKdOMjokQy8t_RZ3_Up5BP-6L5Uvz37VFV09y85spaU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:03:05Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/HIxR5w", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/avR61Q", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/qQ1QMQ", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" } ] } 2024-11-15 17:28:37,917:DEBUG:acme.client:Storing nonce: usf-jMgXyKdOMjokQy8t_RZ3_Up5BP-6L5Uvz37VFV09y85spaU 2024-11-15 17:28:37,917:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-15 17:28:37,919:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-11-15 17:28:37,919:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-15 17:28:37,920:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-15 17:28:37,920:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:28:37,921:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-15 17:28:37,921:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-15 17:28:37,921:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-15 17:28:37,923:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-15 17:28:37,923:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-11-15 17:28:37,923:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-11-15 17:28:37,934:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-11-15 17:28:37,936:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)