2024-11-14 13:23:24,169:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-11-14 13:23:24,170:DEBUG:certbot._internal.main:Arguments: [] 2024-11-14 13:23:24,170:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-14 13:23:24,960:DEBUG:certbot._internal.log:Root logging level set at 20 2024-11-14 13:23:24,960:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-11-14 13:23:25,002:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-11-14 13:23:25,048:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-14 13:23:25,762:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:23:25,774:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-11-14 13:23:25,780:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-11-14 13:23:25,789:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:06 UTC. 2024-11-14 13:23:25,790:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:23:25,790:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:23:25,795:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:23:25,796:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:23:25,796:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:23:25,803:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:23:25,804:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:23:25,806:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:23:26,257:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:23:26,258:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:23:27 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "tGECm88glvs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-14 13:23:26,259:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:23:33,168:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8571_key-certbot.pem 2024-11-14 13:23:39,698:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8569_csr-certbot.pem 2024-11-14 13:23:39,699:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:23:39,699:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:23:39,845:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:23:39,846:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:23:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: bBPm6dJGfCtUd5762yxQxdllQQBwye1_e3oZyO4sdEswRW-N9EQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:23:39,846:DEBUG:acme.client:Storing nonce: bBPm6dJGfCtUd5762yxQxdllQQBwye1_e3oZyO4sdEswRW-N9EQ 2024-11-14 13:23:39,846:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:23:39,853:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYkJQbTZkSkdmQ3RVZDU3NjJ5eFF4ZGxsUVFCd3llMV9lM29aeU80c2RFc3dSVy1OOUVRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fApNWYfWjRSgpvubThlzqJgMMddLMsqjYjcSmEi-1kgIkdJqhFpYSEAF1Fc-NQfel16UNz9fYUAiJ8G0dOPpazFC0MfVTP19urtOLZgSpobHhlnQ7ubmplOEkKYuwvRBYE-F1eY4UZU-T-7-gJP40yILVulNbXDWq2vV7wDLkajjc82AJi1sfqSUGh8k6dCsH7gAyYB6c68iMGp9bynuBofXGCpzBlgcB53tE-627e0wQUj-Nvu-weBzKnWoBLzgp57YTx8zXsiPmTMLAwCOj1qOKArS5ewwh07fzesEgR8OgPtCbwkhO-nKu--ee_8khhc_iAOZ7pxIDMYB_1StpQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-14 13:23:40,034:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-14 13:23:40,035:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:23:41 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863894397 Replay-Nonce: bBPm6dJGVTXJnnVNcBxo1JaeTa4iilklyy2PHZtw7etXSfSvRmM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:15Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863894397" } 2024-11-14 13:23:40,035:DEBUG:acme.client:Storing nonce: bBPm6dJGVTXJnnVNcBxo1JaeTa4iilklyy2PHZtw7etXSfSvRmM 2024-11-14 13:23:40,035:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:23:40,042:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776062317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYkJQbTZkSkdWVFhKbm5WTmNCeG8xSmFlVGE0aWlsa2x5eTJQSFp0dzdldFhTZlN2Um1NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYwNjIzMTcifQ", "signature": "lgKJDFfDBUOsE5FfH68SxtqoxtjeHpdV6Wh3H5ARWyInskVZ0zBPB5-dGzdupQPlIdM3s7lYc6a1jQiSkZESmW6imDCHSJlVEMOeVroYwq69fcu3iy9dsjnPinAfE2BB2nVJ5EjCLzziGUitfbDpv6nYQ6FJQkfVgyf1FxST8Dwmz5cK4BH7SW-zcr4mBjz5snJld5ZrYGM6uf_Cb86HppdbZrCOAi31zYxsiTERTGqB-7BTLgB070R7dsrbn-NpyKM81-e8M_eb4DO9N2jevs9K_MW4EaBG6e_xSf8RnOL9qlgYTb49haPHzdrmWs79KN20AhBQ294QTXA9Fi-Mmg", "payload": "" } 2024-11-14 13:23:40,203:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776062317 HTTP/1.1" 200 810 2024-11-14 13:23:40,204:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:23:41 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SEOe4WhpJvGtxshaQ-GFrfSC3wAUn2gv5jrWP3YwEXQsCR2TrHM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:15Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Fppccw", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/Nohq5w", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776062317/_bn1HA", "status": "pending", "token": "lswJkCyNLJQ0grmL1aO4Rz0h2hprh46C8G8klUa_hHI" } ] } 2024-11-14 13:23:40,204:DEBUG:acme.client:Storing nonce: SEOe4WhpJvGtxshaQ-GFrfSC3wAUn2gv5jrWP3YwEXQsCR2TrHM 2024-11-14 13:23:40,205:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:23:40,205:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-11-14 13:23:40,217:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:23:40,217:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:23:40,221:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:23:40,221:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:23:40,221:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:23:40,222:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:23:40,226:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:23:40,266:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-14 13:23:40,489:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:23:40,490:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-14 13:23:40,491:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-14 13:23:40,496:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:27 UTC. 2024-11-14 13:23:40,496:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:23:40,496:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:23:40,500:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:23:40,501:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:23:40,501:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:23:40,506:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:23:40,506:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:23:40,509:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:23:40,975:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:23:40,976:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:23:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "xce0h2oM3K8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-14 13:23:40,976:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:23:47,055:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8572_key-certbot.pem 2024-11-14 13:23:52,967:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8570_csr-certbot.pem 2024-11-14 13:23:52,968:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:23:52,968:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:23:53,123:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:23:53,124:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:23:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcVnP1SqraQpn4VtCjx0h4fkQsWgSdaKO0Cma1l48eqtw0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:23:53,124:DEBUG:acme.client:Storing nonce: aHUr_lcVnP1SqraQpn4VtCjx0h4fkQsWgSdaKO0Cma1l48eqtw0 2024-11-14 13:23:53,124:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:23:53,130:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYUhVcl9sY1ZuUDFTcXJhUXBuNFZ0Q2p4MGg0ZmtRc1dnU2RhS08wQ21hMWw0OGVxdHcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dC8W3rSCrEUqrYSKxSHYi922k8ZEo_og69vLWR8iU91kFlldCn_Gi-aZoAPqh4R_ilN3THPy0vvkghVVE-WcM4llfjvLguhzO0JxUr_Eh6vPQCP3ITRW_mEQgPTkiEaAgw9ymuyzcBzatXKxPG9FZZUyHwYNABORwXJVMPI7aUKRh0Orw38Xv73P94DyvjZd-mRJbdTS7Z4TvKjLpemsCvxOKOIMkGVnxm-loevlA4Kuf8gHM3SQJHM7AHxEfjudCxiVlXy1HyI8Fn0bh10phfF8hUR1VWGQShZJ47FemSpkE5p9RmtGU5rp3xPpqQ_gTLL-w4p6oC7R7idvHyRE7Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-14 13:23:53,317:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-11-14 13:23:53,318:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:23:54 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322863990237 Replay-Nonce: aHUr_lcV1EQzX0O1vEYyFHm2FvmjU3Lk0pUadB6H6STr5uaNej4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:28Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322863990237" } 2024-11-14 13:23:53,318:DEBUG:acme.client:Storing nonce: aHUr_lcV1EQzX0O1vEYyFHm2FvmjU3Lk0pUadB6H6STr5uaNej4 2024-11-14 13:23:53,318:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:23:53,324:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776191227: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYUhVcl9sY1YxRVF6WDBPMXZFWXlGSG0yRnZtalUzTGswcFVhZEI2SDZTVHI1dWFOZWo0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYxOTEyMjcifQ", "signature": "ZlpPk3i9qCW5ir-BX0Q62PJj7PWLr_y06lNn5uz565Y6jr7nWv_jWN0Io7Kkq1Mt65pczYtDBg16FH7YIg4jW0R2Fvv0tVbxOew1GHSDTZ0tXoi2RsB_LOg1n15lp04nDA7rXEMPJzV4qMhmbJf16VfQyzzAX3w85ERMgBdByk4xPJ1ZCfvOfXp69QLEQRYMMOiXcVAOTiNAg2-Hst98b3BDUgu6tBr_UFDy3Z3lKALJMHeUkPlBcsl_OaLwB38g9wsIkRbrYlQgkaL7yyn8lGlqNa7ZIl5CgLPH7dQgN6u7y61fAeekdtmPjmbxaZtSOgGvBUQDdHELJs-5W5kFWA", "payload": "" } 2024-11-14 13:23:53,485:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776191227 HTTP/1.1" 200 804 2024-11-14 13:23:53,486:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:23:54 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SHEOpopMiE6O081rVlWqzvUM5c2OGfxDtAd6OUUhGeDyq-7CoK8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:28Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/Hvp1ig", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/tag9BQ", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776191227/vZq3rg", "status": "pending", "token": "3X882IwprzT4GsdwGmSzP9UCAH6hFm7Lq10u-oVous0" } ] } 2024-11-14 13:23:53,486:DEBUG:acme.client:Storing nonce: SHEOpopMiE6O081rVlWqzvUM5c2OGfxDtAd6OUUhGeDyq-7CoK8 2024-11-14 13:23:53,487:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:23:53,487:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-11-14 13:23:53,488:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:23:53,488:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:23:53,489:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:23:53,489:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:23:53,489:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:23:53,490:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:23:53,491:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:23:53,534:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-14 13:23:53,796:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:23:53,797:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-14 13:23:53,798:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-14 13:23:53,802:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:01:47 UTC. 2024-11-14 13:23:53,802:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:23:53,804:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:23:53,808:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:23:53,809:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:23:53,809:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:23:53,827:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:23:53,828:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:23:53,830:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:23:54,299:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:23:54,300:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:23:55 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "h4VDLplS0qs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 13:23:54,301:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:24:00,165:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8573_key-certbot.pem 2024-11-14 13:24:05,565:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8571_csr-certbot.pem 2024-11-14 13:24:05,566:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:24:05,566:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:24:05,724:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:24:05,725:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcVvH8aj0m-IKIkmlvDHFw0wrQxN2-5mfby1wo4UU6xxbI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:24:05,725:DEBUG:acme.client:Storing nonce: aHUr_lcVvH8aj0m-IKIkmlvDHFw0wrQxN2-5mfby1wo4UU6xxbI 2024-11-14 13:24:05,726:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:24:05,733:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYUhVcl9sY1Z2SDhhajBtLUlLSWttbHZESEZ3MHdyUXhOMi01bWZieTF3bzRVVTZ4eGJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ozgjYizK9_q1GqYikcqqTglYF-qE8S3zPJTuy2LnycV3XNnXWihHDPFC7jiIZcI6Tt4sx302ch6YWwqKKznxJesKmHF4aClqY0_HxWwi1H0bxcSD_zIMS3lICtfKQxnT2u3Q293gw_Bo6jVZTZ8vigCZiMHrAG7gJRRetalSsDUcX-FTBNIx10XgOfw0Lbl0lcaplLzdChTL7FYPivc97aeCfwybCkekOFsSxQKlqt60jGQPLOlBwvet_LYhUhhwrwlHFbSy5MVF30852GsgMJgW8F1RUiRrypMrTm_2gCwJZWWay8LgHez12DWZ3l3NsGJ1Keu2Z8PCY0uO6jTHpA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-14 13:24:05,917:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-14 13:24:05,918:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:24:06 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864075277 Replay-Nonce: SHEOpopMg8ty36IqClzyMTOeiwnsGMWLaaV6Nv7r__Z3DLD1238 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:41Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864075277" } 2024-11-14 13:24:05,918:DEBUG:acme.client:Storing nonce: SHEOpopMg8ty36IqClzyMTOeiwnsGMWLaaV6Nv7r__Z3DLD1238 2024-11-14 13:24:05,918:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:24:05,924:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776309317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0hFT3BvcE1nOHR5MzZJcUNsenlNVE9laXduc0dNV0xhYVY2TnY3cl9fWjNETEQxMjM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzYzMDkzMTcifQ", "signature": "R7XWw0ucOq9PHX9H_MX-6BNMFG3K2VMdmN0K3oRCDNWdE1neMvAHPz_vhCXAVH2cJBlxx7Y7tDexqXd2gO5uqrjh4hi9MZH-xv3aESBEg2kmXyv8awR-rbR2FNua4gJhekLEjrcYfy-mf2obtE2pUo3OvmB3cUSfUrQbCvP5mYakFxEX9cePhzjgg2DDfWIbzNdleTp1eym1oVkVTloc8yL0OZ86xp4SyEAHNuBJwdTSyrJUiozyyTKIYdKPZwf5bF4pzhORnneWpEZfHdSnr69EwoHgYoKeRmOdqomTTB5sdQtWAAZrDCSjXvVz2G9NpTuxhLdnVlOGPT0i_inurQ", "payload": "" } 2024-11-14 13:24:06,098:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776309317 HTTP/1.1" 200 807 2024-11-14 13:24:06,099:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:07 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SHEOpopMbPqYt5Lm31-AHFGnZhEDuJ8zzcbXAyf78WACieDiD74 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:41Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/8Wvihw", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/RhhX0A", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776309317/9T0aKw", "status": "pending", "token": "8vcwksDQV9y1AhF3_JkKqZu4re7opvQYlcOScJBZGqo" } ] } 2024-11-14 13:24:06,099:DEBUG:acme.client:Storing nonce: SHEOpopMbPqYt5Lm31-AHFGnZhEDuJ8zzcbXAyf78WACieDiD74 2024-11-14 13:24:06,100:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:24:06,100:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-11-14 13:24:06,101:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:24:06,101:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:24:06,102:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:24:06,102:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:24:06,102:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:24:06,102:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:24:06,104:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:24:06,153:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-14 13:24:06,558:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:24:06,560:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-11-14 13:24:06,560:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-11-14 13:24:06,565:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-11-14 13:24:06,569:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:24:06,625:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-14 13:24:06,833:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:24:06,834:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-14 13:24:06,835:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-14 13:24:06,839:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:08 UTC. 2024-11-14 13:24:06,839:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:24:06,839:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:24:06,845:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:24:06,845:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:24:06,845:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:24:06,850:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:24:06,851:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:24:06,853:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:24:07,333:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:24:07,333:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:08 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8woftKBS5b0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 13:24:07,333:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:24:13,082:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8574_key-certbot.pem 2024-11-14 13:24:18,479:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8572_csr-certbot.pem 2024-11-14 13:24:18,479:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:24:18,480:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:24:18,639:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:24:18,640:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SHEOpopMl-__708nvrCA2lVzuTCi0y3i4RB9544qlSZihXhaCW4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:24:18,640:DEBUG:acme.client:Storing nonce: SHEOpopMl-__708nvrCA2lVzuTCi0y3i4RB9544qlSZihXhaCW4 2024-11-14 13:24:18,641:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:24:18,647:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0hFT3BvcE1sLV9fNzA4bnZyQ0EybFZ6dVRDaTB5M2k0UkI5NTQ0cWxTWmloWGhhQ1c0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mvBybwJmbLjVz_eweQHrNSgX-w6AQCVsOmwxYHmLF0UE9J2XG0Di8QhVUuqXYlh_ltBgu3uCJy3BHOmiwmbYoIsXT-dt5_PjBjQiblPyM4EUWYsLw-kar98QpQUv9WDNU_OI7jDVu7HCvQ1IP8vW2VUuJflttnUByixN5GrTmlk-m5p5K89_Y4HjUs8hnupVcC8NFFz8KOVLJPUGYt568_wBNAZ-tR_TOzGNouEqqPPFKvdfmXYkeozTINkJC7uEQDbe2TEAuAOl8Ax7p9DTElJ2br1BI7dufycQPsR1GQ9gBklJ067prx8DUy5nT8DwU_X6OzmD-xZGnuNua7H13A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-14 13:24:18,824:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-11-14 13:24:18,825:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:24:19 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864158237 Replay-Nonce: aHUr_lcVHgKUQTzZxzmkLK-vo-sx2k7Ox15OoO-kQOShHJG6tIY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:00:54Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864158237" } 2024-11-14 13:24:18,825:DEBUG:acme.client:Storing nonce: aHUr_lcVHgKUQTzZxzmkLK-vo-sx2k7Ox15OoO-kQOShHJG6tIY 2024-11-14 13:24:18,825:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:24:18,831:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776432107: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYUhVcl9sY1ZIZ0tVUVR6Wnh6bWtMSy12by1zeDJrN094MTVPb08ta1FPU2hISkc2dElZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY0MzIxMDcifQ", "signature": "XCb2kj_MDZRA4TVKw1nqw5ElXfjvKjZq9KfImaHxW3ff8rO9EatHQu_58WdoezwX4RGa-P5bTx5fAHAfl5tKv9pjHSyDYEDHRMlXrp0kT6hRmOPuYpDu5xRcy5pfW4y5TG1Oah9R-x-tXFoWCRQtldaOaOxp_2QH-qBm_DKYb5IZ62A7FF4ojgznSPVBAYm4aOTRCszQkQA9eXtMu4SL9_Wn4tTG_22T8w_zkl5dDgtLqPidGbiRvnXVksWhVyY38k8szv6z9iROAQijYjdWMknW6522crJlBv_5zsKxXwxpsikCBDa7YGDRZ5QhmU2mCQFuLncglSl8vxryYQxmNQ", "payload": "" } 2024-11-14 13:24:18,996:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776432107 HTTP/1.1" 200 801 2024-11-14 13:24:18,996:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:19 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcVNgPCHzrKmYI0Qe6y9Br0L9jGAvNPJ_I49pS0gJ7u4RU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:00:54Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/iWIilA", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/U1YmAg", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776432107/Wk_i8A", "status": "pending", "token": "VZ7urCOU50tienT0mFfH9ZhPHAVuZrkGnP0EHA1WdiA" } ] } 2024-11-14 13:24:18,997:DEBUG:acme.client:Storing nonce: aHUr_lcVNgPCHzrKmYI0Qe6y9Br0L9jGAvNPJ_I49pS0gJ7u4RU 2024-11-14 13:24:18,997:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:24:18,997:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-11-14 13:24:18,998:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:24:18,998:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:24:18,999:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:24:18,999:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:24:18,999:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:24:19,000:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:24:19,001:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:24:19,053:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-14 13:24:19,270:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:24:19,271:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-14 13:24:19,272:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-14 13:24:19,277:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:27 UTC. 2024-11-14 13:24:19,277:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:24:19,277:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:24:19,283:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:24:19,283:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:24:19,283:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:24:19,288:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:24:19,289:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:24:19,291:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:24:19,769:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:24:19,769:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:20 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5Fi4bfmkSH4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 13:24:19,770:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:24:25,690:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8575_key-certbot.pem 2024-11-14 13:24:31,086:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8573_csr-certbot.pem 2024-11-14 13:24:31,087:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:24:31,087:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:24:31,247:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:24:31,248:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcVuhu304q_mnRwn1R85lxOMvzle3WVAVlBvleGT64SHpI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:24:31,248:DEBUG:acme.client:Storing nonce: aHUr_lcVuhu304q_mnRwn1R85lxOMvzle3WVAVlBvleGT64SHpI 2024-11-14 13:24:31,248:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:24:31,254:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYUhVcl9sY1Z1aHUzMDRxX21uUnduMVI4NWx4T012emxlM1dWQVZsQnZsZUdUNjRTSHBJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "w5iVVW9_et4fo6G7Y0gGNgxj50wMrzDtyuFq7zu50Q778glfklkWmOwiR1fuhiem6VfdaLkOCTFpjcOwcWGxI3R1q62t7c7q22ZtzYbUMaa7vn00tBAjRjC3cIrOaOmMUZQ7PUaR6CLqB7eMwhTxKthrA4oFbqNtQk6duCA-Q-TUmaE4E65Rpq2tDKrCE11wB10ZvQ2KXX9iLHgXEA1un6-i-EGBXHlYhgjDgyV1P132NshcmtwosLR5iGPpKlnHDKc25W0ln5L1P6XeAwRHxIXoT0h-F6R_4snOrfbSkgzxnqyzppmp5BEqof-OlO91s8mDcHMavRF_1O2ie3EzcQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-14 13:24:31,440:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-14 13:24:31,441:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:24:32 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864248527 Replay-Nonce: SHEOpopMOOM-H6y5rAJpowFJw0xkIqGubUY-Ett73dAx-D4fTJo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:07Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864248527" } 2024-11-14 13:24:31,441:DEBUG:acme.client:Storing nonce: SHEOpopMOOM-H6y5rAJpowFJw0xkIqGubUY-Ett73dAx-D4fTJo 2024-11-14 13:24:31,441:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:24:31,448:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776561677: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0hFT3BvcE1PT00tSDZ5NXJBSnBvd0ZKdzB4a0lxR3ViVVktRXR0NzNkQXgtRDRmVEpvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY1NjE2NzcifQ", "signature": "WWrqx2LYqYgvw54UbKG06lNzH408skP8KwnJaUUyfj-2S6tTQCjNxUFI2i8h1kXNYduzW5OMjnB96CRQHWUPq8hj7NYimueRXsCZBEtMOdOWIFW-l14JMBzgvIjYkYhHcuxCCGrXXWUkr_e2Oe72UUOE1udGYOxzeFdQYLXPRafaV63B6_ZtKdDQSu8Qeq9DIZadNo-u4UWVCy3yJtjxL9v_4Z6MKFFfZ6DRYcPE_YbnCMgvwWzkQNy7P5kKvmqTQJ_YvK83wLUv98obP-yoPGvtuoZUntKNVkXtnE9Kg9HjMGeDrGD6Kq01r_1MgUOtbE5C-GthRMoLXbixPfkj1g", "payload": "" } 2024-11-14 13:24:31,614:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776561677 HTTP/1.1" 200 805 2024-11-14 13:24:31,614:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:32 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcVn6uRMK1C0qRDT1ykcfSD5EEZcAnY2AfuZZj_BCAcZhU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:07Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/QOkASw", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/S4Po3g", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776561677/kvNskw", "status": "pending", "token": "3nVcZIyxJZysDDxP0IT4BuDvRd7U7QigKuNvWS4hW5I" } ] } 2024-11-14 13:24:31,615:DEBUG:acme.client:Storing nonce: aHUr_lcVn6uRMK1C0qRDT1ykcfSD5EEZcAnY2AfuZZj_BCAcZhU 2024-11-14 13:24:31,615:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:24:31,616:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-11-14 13:24:31,616:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:24:31,616:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:24:31,617:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:24:31,617:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:24:31,617:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:24:31,618:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:24:31,619:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:24:31,670:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-14 13:24:31,922:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:24:31,923:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-14 13:24:31,923:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-14 13:24:31,928:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:02:58 UTC. 2024-11-14 13:24:31,928:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:24:31,929:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:24:31,934:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:24:31,934:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:24:31,935:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:24:31,939:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:24:31,940:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:24:31,942:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:24:32,438:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:24:32,439:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:33 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9sNPMMVQ_Ho": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 13:24:32,439:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:24:38,466:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8576_key-certbot.pem 2024-11-14 13:24:43,873:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8574_csr-certbot.pem 2024-11-14 13:24:43,873:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:24:43,873:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:24:44,038:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:24:44,038:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcVkNdhkCCUsLsj-6a0cH2H9Ki30eg_ctfWjRUNHCzTKMw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:24:44,038:DEBUG:acme.client:Storing nonce: aHUr_lcVkNdhkCCUsLsj-6a0cH2H9Ki30eg_ctfWjRUNHCzTKMw 2024-11-14 13:24:44,039:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:24:44,045:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYUhVcl9sY1ZrTmRoa0NDVXNMc2otNmEwY0gySDlLaTMwZWdfY3RmV2pSVU5IQ3pUS013IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SivZfV4B82NWXDl7gFeoDVg7u-L-XlFm2qrlC2lkyDWkujRaJJ9MvnVUuDKP0ZOrr1Q_BgW-WFgU_wp1V8O9YIptgVQ6aPsSFbW9O2LnJHvMTL1MhUFNIehuszu-wc5sa_hs0g9xseKM6lqwNd5rIOtdLEEqE7kdwm3U8CnQUqQaH_1HE0_hlw0oC4ajIJR5uQN6h-7d7E6bb2JE30HGKFvSYokNYA3YBhTY_kJUig-1-W3AmhbN2rBm4iDrcmwWO-TI5VVbJBDXj8bJ5V0C1pYyHfAgYeukGbp9u2PsXV8SlP-O1_NOGnedoNVjhCCQzGLTgB6xPEKSRsWxTasRyQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-14 13:24:44,236:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-11-14 13:24:44,236:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:24:45 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864332297 Replay-Nonce: aHUr_lcVxCKh2-OJIJGFJ1Is7qTF8j_M9yOD_n6tDNo02q2Z82w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:20Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864332297" } 2024-11-14 13:24:44,237:DEBUG:acme.client:Storing nonce: aHUr_lcVxCKh2-OJIJGFJ1Is7qTF8j_M9yOD_n6tDNo02q2Z82w 2024-11-14 13:24:44,237:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:24:44,243:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776685657: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYUhVcl9sY1Z4Q0toMi1PSklKR0ZKMUlzN3FURjhqX005eU9EX242dERObzAycTJaODJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY2ODU2NTcifQ", "signature": "kuRd3EK18mXFVOrOQI-yhHS4z6V8YwaUgMVWHKmTZ0U7GtfpZbyrilG4gzkMjsMs51J97DOcCXqThg5-4rfiE81e4719vYL0D8D_R6cHyDCwWOrPlCIzA0w0GmCnyz7XKZfgGzibBmqKg8tYhgbJAyi5-uOYA0frJhPNAqMAEJBKZc5o0iVi-dOszhmA-a6p1tadFcvrSdxLQT0SrIrVRYkavnx1l0woBBUbXPPAAiMPfml-ee68ngpaCRD7CN_jpN3D39pQ5k9SykmQz4Mcu8gbfsY4AqQBVJNf0Yqhq465-owViHDJ6Eh-IKnUdUeCcsfWozsyUhBVSa0v8r4Asw", "payload": "" } 2024-11-14 13:24:44,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776685657 HTTP/1.1" 200 809 2024-11-14 13:24:44,414:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:45 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcV98nKfuuipdEZj0VI_bFgw30uw7xfETLfzajo4HLLrb8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:20Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/BBENhw", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/DgbGnw", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776685657/s3nu5w", "status": "pending", "token": "0aAWY4tEMhSeCdrS3rnhwS5pzM2gEtQm60TKAxSwrmg" } ] } 2024-11-14 13:24:44,414:DEBUG:acme.client:Storing nonce: aHUr_lcV98nKfuuipdEZj0VI_bFgw30uw7xfETLfzajo4HLLrb8 2024-11-14 13:24:44,416:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:24:44,416:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-11-14 13:24:44,417:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:24:44,417:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:24:44,418:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:24:44,418:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:24:44,418:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:24:44,419:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:24:44,420:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:24:44,469:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-14 13:24:44,683:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:24:44,684:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2024-11-14 13:24:44,685:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2024-11-14 13:24:44,689:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:15 UTC. 2024-11-14 13:24:44,689:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:24:44,690:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:24:44,694:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:24:44,694:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:24:44,694:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:24:44,699:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:24:44,700:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:24:44,702:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:24:45,153:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:24:45,154:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:46 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "IjBEmJrTKkQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 13:24:45,154:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:24:50,910:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8577_key-certbot.pem 2024-11-14 13:24:56,488:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8575_csr-certbot.pem 2024-11-14 13:24:56,488:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:24:56,488:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:24:56,642:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:24:56,642:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: bBPm6dJGFLpchOAGBRa4SyUm_2Ld7SVgDzUr_djZxUU28jIa1to X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:24:56,642:DEBUG:acme.client:Storing nonce: bBPm6dJGFLpchOAGBRa4SyUm_2Ld7SVgDzUr_djZxUU28jIa1to 2024-11-14 13:24:56,643:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:24:56,649:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYkJQbTZkSkdGTHBjaE9BR0JSYTRTeVVtXzJMZDdTVmdEelVyX2RqWnhVVTI4aklhMXRvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Xiyo_zkfDQxlQLK9JxjVGTJQeJ3TjZaflIzY5sbuVSF-T5c3OdEiKuwX2g13kUTzDdM5o56ooutfbfEUhcIQitLWkb83DfM7R16pLSsZ-EPY9Q7fuyddkpfIq9RXeem8WOE3nUrg8JgzoqYEKwGjAW3GzrUCfEvX1s0M48559Cm21KFSyshkq9ZajRhXju0RiEUepjn0-VBMgeqIcyQUEh0vkQl-SwAOiLKd8wDkOcaTLLwv4uVy4MV8CV64cBLChAE3tGSY9KItwsacFyOPmoiEhUxv20E-eIYgYs79whbfYY9xuhrbYJWD0Q6dfyFi2z85sGmB1ohwZrkLs04p_Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-14 13:24:56,887:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-11-14 13:24:56,888:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:24:57 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864408807 Replay-Nonce: bBPm6dJGQgeb36Mr1AML0FzTD1w9I9XWaks_aPlvvwnei3fEq3Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:33Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864408807" } 2024-11-14 13:24:56,888:DEBUG:acme.client:Storing nonce: bBPm6dJGQgeb36Mr1AML0FzTD1w9I9XWaks_aPlvvwnei3fEq3Y 2024-11-14 13:24:56,888:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:24:56,894:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776800527: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYkJQbTZkSkdRZ2ViMzZNcjFBTUwwRnpURDF3OUk5WFdha3NfYVBsdnZ3bmVpM2ZFcTNZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY4MDA1MjcifQ", "signature": "aXiMraLamfgoRptzHTwGs2Cg_4s46hqxkm1LjwyzHsw8yiQWQ5zfDRoTPh--7IFfvupz-UfEk1eKIOdksEDKId_GQJ9I23nB6xPGNhesr7aeIu5iMolvo2q-CzckdNltknHPr2VIPZds0FPsQvr77q8ero-MFuO0WQcSwd9DPFHejPwJRLouHolDbIZKba4jHO9LElx21wOLswjKt-hHZcITC5wfO-evbHAiRqm_yIsDc74aGrqBJlwZ30ozBx-HpsTwgJlbH42OHK1yiN96N14jwGi1b6pRNFfOG65AEge0wtWbwP1XtKFeWOeoUn1IsujnUKbGRWJAiopHfc3ilA", "payload": "" } 2024-11-14 13:24:57,055:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776800527 HTTP/1.1" 200 807 2024-11-14 13:24:57,055:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:58 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SEOe4WhpNLEhnELaEez0YoctB30bfHIA-_K1nrHPjo-qc0qh1R4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:33Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/yjXnZA", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/B8BcEw", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776800527/uHoKaA", "status": "pending", "token": "En1TaVqaIetc1oaGYI0zktYCFWwqviXBPPXCmIrYG_o" } ] } 2024-11-14 13:24:57,056:DEBUG:acme.client:Storing nonce: SEOe4WhpNLEhnELaEez0YoctB30bfHIA-_K1nrHPjo-qc0qh1R4 2024-11-14 13:24:57,057:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:24:57,058:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-11-14 13:24:57,058:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:24:57,059:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:24:57,060:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:24:57,060:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:24:57,060:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:24:57,060:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:24:57,061:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:24:57,112:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-14 13:24:57,333:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:24:57,334:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-14 13:24:57,335:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-14 13:24:57,340:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:37 UTC. 2024-11-14 13:24:57,340:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:24:57,340:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:24:57,345:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:24:57,345:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:24:57,345:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:24:57,350:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:24:57,351:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:24:57,353:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:24:57,820:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:24:57,821:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:24:58 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TIyYGXeQ80U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 13:24:57,821:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:25:03,706:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8578_key-certbot.pem 2024-11-14 13:25:09,593:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8576_csr-certbot.pem 2024-11-14 13:25:09,594:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:25:09,594:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:25:09,751:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:25:09,751:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:25:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcVJZXj99ZJofRJj_sBZkAxmrAfwQ2AxSXD1ME-G5g0A40 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:25:09,752:DEBUG:acme.client:Storing nonce: aHUr_lcVJZXj99ZJofRJj_sBZkAxmrAfwQ2AxSXD1ME-G5g0A40 2024-11-14 13:25:09,752:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:25:09,758:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYUhVcl9sY1ZKWlhqOTlaSm9mUkpqX3NCWmtBeG1yQWZ3UTJBeFNYRDFNRS1HNWcwQTQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pX8nVXthSrvtxpMBLAlGJ5gsmq6-_Bh-83-qWrwuS6BgCudg8JfIt7DCUgHJoxQXYV_0dtPldXVwNfc153ThXX6bnKCHbIf3-PLrDoSugzx2A4flOeNosVYj0XegP5IEJrv-r_YHxGgEgmZFmNmIeOifTXmZw4oEDAW354qlbyli6EhSPEYB4GrbSbTHC7aUfsumOeFiwMtXJ2S6IqrmWpo8gLZ7PaaIj6vk9m9iV1JKYJsHzs6MXZVYy9uC6jSM5_4XXgbXT1FntJ5HfifgSSsztPA7aIIyW0N43Sg0H_M176mGAdvUv-8YI5pnongUjJAIMrYWAQvuC_s1BK3lEQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-14 13:25:09,936:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-11-14 13:25:09,936:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:25:10 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864481367 Replay-Nonce: aHUr_lcVJs3F6aZQmKB4TUMkNvAjs42YLY94ofY14GCgdpXE7O8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:46Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864481367" } 2024-11-14 13:25:09,937:DEBUG:acme.client:Storing nonce: aHUr_lcVJs3F6aZQmKB4TUMkNvAjs42YLY94ofY14GCgdpXE7O8 2024-11-14 13:25:09,937:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:25:09,943:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429776908267: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYUhVcl9sY1ZKczNGNmFaUW1LQjRUVU1rTnZBanM0MllMWTk0b2ZZMTRHQ2dkcFhFN084IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzY5MDgyNjcifQ", "signature": "X3PeNS_U0trucPpOrKTAJgf2mkRJ8Jelfc-qPhQsK4yrCmT8-8ESefuVn1l0vNNecQjochIIvtD1hbwsa6uwG2O_30L2lsFbR180B79dEQIIDxaNJ9ktMDubTZvAKe_v3lYK5F_DXpaYMW68TUPGGlPP7ChAxAuehs68IwN6-3w9RJuzChaimckNVG0aTLPq-RBaZnlz5yikyzdQAYotdf9j4h257lkuqlgzSBaYCM59QJzmMgiJ_ymig_jniIVDFfjUuUsOU22AySNKPzsiUcX9DLpFdGkf28AlnROCEvl6wS9XzCi2eZPA0Ws_kfeYVum02yNTlvCPqDHnJppEFA", "payload": "" } 2024-11-14 13:25:10,115:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429776908267 HTTP/1.1" 200 806 2024-11-14 13:25:10,116:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:25:11 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcVrz4Ipgw6gNxmldutq2fk3nUozt4vCTQonR5_zpiMLyk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:46Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/tMqdPg", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/pzyROQ", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429776908267/PhZSOw", "status": "pending", "token": "M7pfAYSe8--lgdQ9XhGXlPBzRhkFsxzaqjp_bsA-P8o" } ] } 2024-11-14 13:25:10,116:DEBUG:acme.client:Storing nonce: aHUr_lcVrz4Ipgw6gNxmldutq2fk3nUozt4vCTQonR5_zpiMLyk 2024-11-14 13:25:10,118:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:25:10,119:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-11-14 13:25:10,119:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:25:10,119:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:25:10,120:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:25:10,120:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:25:10,120:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:25:10,121:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:25:10,122:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:25:10,171:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-11-14 13:25:10,171:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:25:10,171:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-11-14 13:25:10,178:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-11-14 13:25:10,181:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-11-14 13:25:10,181:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-11-14 13:25:10,181:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-14 13:25:10,182:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-11-14 13:25:10,183:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-11-14 13:25:10,229:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-14 13:25:10,563:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:25:10,564:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-14 13:25:10,565:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-14 13:25:10,570:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:03:56 UTC. 2024-11-14 13:25:10,571:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:25:10,571:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:25:10,577:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:25:10,577:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:25:10,577:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:25:10,593:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:25:10,594:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:25:10,596:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:25:11,081:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:25:11,082:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:25:12 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "y3FO50iewtk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-11-14 13:25:11,082:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:25:17,299:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8579_key-certbot.pem 2024-11-14 13:25:23,195:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8577_csr-certbot.pem 2024-11-14 13:25:23,196:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:25:23,196:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:25:23,357:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:25:23,357:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:25:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SHEOpopMHz46S9T6DYT9qX664owjlRyfNlNTBkTi9AZuYfBE4iE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:25:23,358:DEBUG:acme.client:Storing nonce: SHEOpopMHz46S9T6DYT9qX664owjlRyfNlNTBkTi9AZuYfBE4iE 2024-11-14 13:25:23,358:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:25:23,366:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0hFT3BvcE1IejQ2UzlUNkRZVDlxWDY2NG93amxSeWZObE5UQmtUaTlBWnVZZkJFNGlFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "caC3jgkz0FuxaDvdmxO7aUCOsodro-JJpDk1iJlSKBdigEzudPJcviBeXnIL8ftsX_Nfon3gy_k4jd9Bz93BgAj6mXdTir00GeTISI2T6y24UgGM0qexTUTSMEqxvKC30OOTbyZpbXcO6cezQHu_tBYF4jLgrmykZMzPiWVJE6uN10Qs-rCMBdfaXEheVm8SJ4vg0ov4ehyFgLeI5zHaBTyrCHAZrynkd1ftpvLKRZDK_W2oqpIVQ6X8pzlsJcGlNhwY-y9CJ9bsMXvLBJUKSBbFyHqBXF9v8YboZ5s09JlGo0NJOczJF2C9DaVVdKikU3s30l260brlm5QLffUzCA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-14 13:25:23,568:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-11-14 13:25:23,569:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:25:24 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864554417 Replay-Nonce: SHEOpopMPbKsm9vsL8-YsjwQp0hEDDfycWrYv6ut5ERXQ78k_-o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:01:59Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864554417" } 2024-11-14 13:25:23,569:DEBUG:acme.client:Storing nonce: SHEOpopMPbKsm9vsL8-YsjwQp0hEDDfycWrYv6ut5ERXQ78k_-o 2024-11-14 13:25:23,570:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:25:23,577:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777016797: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0hFT3BvcE1QYktzbTl2c0w4LVlzandRcDBoRUREZnljV3JZdjZ1dDVFUlhRNzhrXy1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcwMTY3OTcifQ", "signature": "VL_mlglmFzOP1ClRMhJLYQKk_-WGnaSIae6LU1LUWB-pUZl2ENd7WKNadUi_wMEhsUDQpXfOPJgYdm2YELGtPSqzyd21WfDhAQ6K5wFEJJ_k90NWndAeqNvgWRJTNnM7xLnZJGuYoeCfvNTay3pg6_Zr1SEVpb-L-VRT-Bz18sevHKLxOBX0lw_y8UcK4m2z-Tr7tHbhGXnPABhmzz8sxD20gcj6vXIVGGAgnlGxf4w-8znjnQ71UubgKR-yEuD1QGqFXTSn5s2eOSJ59EGq_IgZ2C4TYIF_DEw18fSVQsWNHWjGKW0j6PVNV5v53ByZkjxUzjY0EO_qkKp2Bo8eUw", "payload": "" } 2024-11-14 13:25:23,744:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777016797 HTTP/1.1" 200 811 2024-11-14 13:25:23,744:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:25:24 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SHEOpopMNT8zELjDmuHUbD9PmcSqoPvVaSF1MjS-j3tKv9zJLy4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:01:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/uNkVbw", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/C4H6lQ", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777016797/tKio5w", "status": "pending", "token": "GfMmAmjkBfKirfZevAD0cYuyE1ac8WPMaTCu9yxDZuE" } ] } 2024-11-14 13:25:23,744:DEBUG:acme.client:Storing nonce: SHEOpopMNT8zELjDmuHUbD9PmcSqoPvVaSF1MjS-j3tKv9zJLy4 2024-11-14 13:25:23,745:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:25:23,746:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-11-14 13:25:23,746:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:25:23,746:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:25:23,747:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:25:23,748:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:25:23,748:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:25:23,749:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:25:23,750:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:25:23,801:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-14 13:25:23,983:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:25:23,984:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-14 13:25:23,985:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-14 13:25:23,990:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:15 UTC. 2024-11-14 13:25:23,990:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:25:23,991:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:25:23,996:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:25:23,996:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:25:23,997:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:25:24,002:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:25:24,003:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:25:24,005:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:25:24,462:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:25:24,462:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:25:25 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "UxSAtmeZEIs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 13:25:24,463:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:25:31,143:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8580_key-certbot.pem 2024-11-14 13:25:36,705:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8578_csr-certbot.pem 2024-11-14 13:25:36,706:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:25:36,706:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:25:36,861:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:25:36,862:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:25:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SEOe4WhpKIFJKpZ9-8RBxb-dDC4mtTr3jDDYMlVQzbqmfOHMTXw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:25:36,862:DEBUG:acme.client:Storing nonce: SEOe4WhpKIFJKpZ9-8RBxb-dDC4mtTr3jDDYMlVQzbqmfOHMTXw 2024-11-14 13:25:36,862:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:25:36,870:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0VPZTRXaHBLSUZKS3BaOS04UkJ4Yi1kREM0bXRUcjNqRERZTWxWUXpicW1mT0hNVFh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qYZ7IDkjPg0IumtZUm-kX4JU4SdWk-NWknzPaDfRWUd18uAbJk-f5eZq_TWoFpAcCdMLGJgulcESdEkQG9zlBfsDY14_9uWilGi7ieDQnRBkh8NvJ9KVXb7uSl9wFjY9l6ZKdVppbwHOkH8cJfKcqAcjs_3SZgbnnTWeDX-g_ZURzx93wT5C3zabWPcWLuzpe8WkG6qWitZ_GGmHCLwmXO32MXcyWfk-ql-8pLI-D6xJYRHaa7S9UjEPajIoHIG8jYepjcNApP8TjHW0RntnRree4d208FZ5qWaGoJP76yXg2ZYfe7VVTHIBrBCUNSQe5lCSO_VatmlLN7NRHy9JlA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-11-14 13:25:37,058:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-11-14 13:25:37,059:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:25:38 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864646067 Replay-Nonce: bBPm6dJGM4ST8LgKvjRNSfE7uZI1J-pkkua7rVdSkh50H8svqok X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:12Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864646067" } 2024-11-14 13:25:37,059:DEBUG:acme.client:Storing nonce: bBPm6dJGM4ST8LgKvjRNSfE7uZI1J-pkkua7rVdSkh50H8svqok 2024-11-14 13:25:37,060:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:25:37,066:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777143667: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYkJQbTZkSkdNNFNUOExnS3ZqUk5TZkU3dVpJMUotcGtrdWE3clZkU2toNTBIOHN2cW9rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcxNDM2NjcifQ", "signature": "ONIY6kqz1Yyt2pyVtV-xAA-6prpT_YPaBLu8gWoqMMeZu9WH2VBepSJMdcMoBU_3qDuG7TcuZR0hSPZD9P_ncKQGbbYMHzLGRNe_Gfsa-CgGRB0-g_CLH4kpHfLyd3mfkdU2Vnu17cZ-iwbiJWfV_vtUf59P2tszQlwBr2zWEMzjrr3Bj5FaUwIfMpaBh7_Pr3LVEI8RkMOAoUbHPt5fA7MH_LJ7sMhYBZKy6Ip-GH4UYZg8GwCFACPAF4WeOZBKDfz0NIyPv-86u0gewdLShjOWugPs9dogGJ3Fbqhz2YfLiiUM7PKWJUglG2CWf6SqXqdEeYdLEJBhfJ0rICl8AQ", "payload": "" } 2024-11-14 13:25:37,233:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777143667 HTTP/1.1" 200 810 2024-11-14 13:25:37,234:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:25:38 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: bBPm6dJGvitrKZ3WC_Ccqm80mcJDDF0IrYM1038XxLUEvl3kXKU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:12Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/I07SEw", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/Ttq2kg", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777143667/9bNT8Q", "status": "pending", "token": "EsfhrhFLkhIoYE_NFmZD_yiH2IacpxlQLXgxVGt0Yao" } ] } 2024-11-14 13:25:37,234:DEBUG:acme.client:Storing nonce: bBPm6dJGvitrKZ3WC_Ccqm80mcJDDF0IrYM1038XxLUEvl3kXKU 2024-11-14 13:25:37,234:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:25:37,235:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-11-14 13:25:37,235:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:25:37,236:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:25:37,237:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:25:37,237:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:25:37,237:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:25:37,237:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:25:37,239:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:25:37,289:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-11-14 13:25:37,526:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:25:37,527:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-11-14 13:25:37,528:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-11-14 13:25:37,533:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:32 UTC. 2024-11-14 13:25:37,533:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:25:37,533:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:25:37,539:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:25:37,539:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:25:37,539:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:25:37,544:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:25:37,545:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:25:37,547:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:25:38,010:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:25:38,011:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:25:38 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "S6FjTT34q3o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 13:25:38,011:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:25:43,783:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8581_key-certbot.pem 2024-11-14 13:25:49,280:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8579_csr-certbot.pem 2024-11-14 13:25:49,281:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:25:49,281:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:25:49,438:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:25:49,438:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:25:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SEOe4WhpzQfdrqHYZLS0m_koDE39HHw57ysEPR_YP1fEnyVkuQQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:25:49,439:DEBUG:acme.client:Storing nonce: SEOe4WhpzQfdrqHYZLS0m_koDE39HHw57ysEPR_YP1fEnyVkuQQ 2024-11-14 13:25:49,439:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:25:49,445:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0VPZTRXaHB6UWZkcnFIWVpMUzBtX2tvREUzOUhIdzU3eXNFUFJfWVAxZkVueVZrdVFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Jh45hOiPus5s5WJZLAtAMsRbJrW8bMyX825nED1b0ne2i8aRY-B1nPx2z-jYmByEpA8h84gRgRSW0U9Vr23Stgd9vuslrHwlsTGLB_ZJ820xF7COy34nC_LyZ8pgDs6G6u_cp1NsdKcOmV45kWuzp3BD7XYAaRHb8t6PSMgt1YioqehG8TBtL8SM1espY6dSm64WpL6bWtodhulAWPJZ4b4qwfHUbfkAox3tjh-sciVL73UzU7sv51E7WZHC2LIs2pysrFVsEWt1GsEnv5HQ3ZavWU_lcWJm4817n2RluEZh0FyOJzanvQKCJdEMfcjOV8eML8qKlL0L_4bnU9a9PA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-11-14 13:25:49,675:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-11-14 13:25:49,676:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:25:50 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864723967 Replay-Nonce: SEOe4Whp71BxlN1irERbBvqf0i9jaBQD_mnjsxWBpsKU2bl47wE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:25Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864723967" } 2024-11-14 13:25:49,676:DEBUG:acme.client:Storing nonce: SEOe4Whp71BxlN1irERbBvqf0i9jaBQD_mnjsxWBpsKU2bl47wE 2024-11-14 13:25:49,676:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:25:49,682:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777258277: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0VPZTRXaHA3MUJ4bE4xaXJFUmJCdnFmMGk5amFCUURfbW5qc3hXQnBzS1UyYmw0N3dFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzcyNTgyNzcifQ", "signature": "QA13VUL0hzDUZD3gvIUAIKaM3e2oINmY7LjDq-JlGgOZ8Ls6gTRz43nXemWaZzQbp9jH_ngamDvFCjXJoeQgVaURnJA-cy7milHlPdQ4bBRNDmtExoO9p3rZr8r8r5yUe3fNKkFNHAXJe9xT7Ru5G4FJ48bjrpN0evTfzIp89uqmcF9Y5bkwdoa7H5xOsFxSg93nqGtH32RxdUEMd_DmeVFgWNJcgZUojFqZ5Ur8CoQGRNTrFgq-66ttcz2y9arsgOQdGuUE_kwn1XfR0nsv12HSp7u_KuH9I7HkV48jodVcGcKWnzuZoemkVPnOjhuQTuBiSk9tI8ghTklbINV-0g", "payload": "" } 2024-11-14 13:25:49,880:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777258277 HTTP/1.1" 200 809 2024-11-14 13:25:49,881:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:25:50 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SEOe4WhpaKFjSn7-COCPL6YXAAvNRJrOvvBmqmK-gL-FHiww6KM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:25Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/GfFFvQ", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/dLzeEg", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777258277/cBbQvQ", "status": "pending", "token": "pKdLPBeHIFVcN_feNwnOg08E4XGFDiELk2HpmLS4H_o" } ] } 2024-11-14 13:25:49,881:DEBUG:acme.client:Storing nonce: SEOe4WhpaKFjSn7-COCPL6YXAAvNRJrOvvBmqmK-gL-FHiww6KM 2024-11-14 13:25:49,882:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:25:49,882:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-11-14 13:25:49,883:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:25:49,883:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:25:49,884:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:25:49,884:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:25:49,884:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:25:49,884:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:25:49,885:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:25:49,938:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-14 13:25:50,146:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:25:50,148:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-11-14 13:25:50,149:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-11-14 13:25:50,154:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:04:52 UTC. 2024-11-14 13:25:50,154:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:25:50,155:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:25:50,160:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:25:50,160:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:25:50,160:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:25:50,176:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:25:50,177:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:25:50,179:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:25:50,663:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:25:50,663:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:25:51 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "K-zB_3wx8dw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 13:25:50,664:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:25:56,655:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8582_key-certbot.pem 2024-11-14 13:26:02,536:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8580_csr-certbot.pem 2024-11-14 13:26:02,537:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:26:02,537:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:26:02,698:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:26:02,699:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:26:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SHEOpopMXceqVlinvn_MWsamzcl36w4q7FtYQKa0qhPGBvkJwu0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:26:02,699:DEBUG:acme.client:Storing nonce: SHEOpopMXceqVlinvn_MWsamzcl36w4q7FtYQKa0qhPGBvkJwu0 2024-11-14 13:26:02,700:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:26:02,706:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0hFT3BvcE1YY2VxVmxpbnZuX01Xc2FtemNsMzZ3NHE3RnRZUUthMHFoUEdCdmtKd3UwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pRMZ6_kD133RpuHjROWOqOtbLcSAMlng25NFdIhG_fl9ch4kVljjAnM_mLR2Kwgus9EVUvnB8W73piDkKpltdK5TfWsjfL4j8cl_cMyRIOodZbSkSY0Ui8yEpV1p_ap1GH9-mC1cBzEYcKKoSJmRYkSZ3u5li9LObDkdv5zNmPOFwcRaXhRamUHSlghnEHfXm42OecfmBsiH251nCN4JCzwEuWQBnfQuWeWZdbwuYZvr---l9Z8paOHlEDtb9Jj3LVkmyvwE-a0MaGbN8mcvT-rV5tuuXcaLM3gWRscicjuLU2ltl2XWDQrzZiHGstrRd4Shull0TztpYxxNcfvdHA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-14 13:26:02,889:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-14 13:26:02,890:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:26:03 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864794357 Replay-Nonce: aHUr_lcVvFbAOZBzsrlDIwdyZQwrDKo4OlySImZ804D0ppHCkNE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:38Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864794357" } 2024-11-14 13:26:02,890:DEBUG:acme.client:Storing nonce: aHUr_lcVvFbAOZBzsrlDIwdyZQwrDKo4OlySImZ804D0ppHCkNE 2024-11-14 13:26:02,890:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:26:02,895:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777360557: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYUhVcl9sY1Z2RmJBT1pCenNybERJd2R5WlF3ckRLbzRPbHlTSW1aODA0RDBwcEhDa05FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3NzczNjA1NTcifQ", "signature": "qLRC0EoqNbHJjEc2ADJxWSGfDFgRFr2qK-7emxowXjZ6uLnhXbC4IUM13P6XVuIMJtAwK_vNTB6C5e8CcCN0B3tQsIvQ72cbloIOLzoCrVQ19JW4syp7D8cqIyQOSzHA1HXRFeb3pq-OJ_2-87qtVQWkyyCyicA6t3Afzyb6OnXw4PNDB-Om6HVdrzwOk1M4lqChJASvIO3hPxQUiUKGdlVOHU8JFfsw8jmoWNlumsgZYlsTHYODGtIEWkwdNSiV_qBuX1wsEgAqI5psMma4gCdrBLq6-WocVVFrYNJi5c-ZB08oDsQVciXVrkFpiSPR7A6T-XFj2VjdLrY_obb3hg", "payload": "" } 2024-11-14 13:26:03,063:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777360557 HTTP/1.1" 200 805 2024-11-14 13:26:03,064:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:26:04 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcVQiwxYndF3dzroI5rc_HKaWPyQ5-1ohSkYWshRvXBrUA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:38Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/Ggc8vg", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/gUrOCA", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777360557/vSGH9w", "status": "pending", "token": "wj3dUyzSm4FM483I4G8PS2yb6_ingabKP5mdFE-Fsjg" } ] } 2024-11-14 13:26:03,064:DEBUG:acme.client:Storing nonce: aHUr_lcVQiwxYndF3dzroI5rc_HKaWPyQ5-1ohSkYWshRvXBrUA 2024-11-14 13:26:03,065:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:26:03,065:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-11-14 13:26:03,066:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:26:03,066:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:26:03,067:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:26:03,067:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:26:03,067:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:26:03,068:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:26:03,069:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:26:03,119:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-14 13:26:03,436:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:26:03,438:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2024-11-14 13:26:03,438:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2024-11-14 13:26:03,443:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:10 UTC. 2024-11-14 13:26:03,443:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:26:03,444:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:26:03,449:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:26:03,449:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:26:03,450:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:26:03,466:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:26:03,467:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:26:03,469:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:26:03,952:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:26:03,953:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:26:04 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "dZuNC9fm3sQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 13:26:03,954:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:26:09,864:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8583_key-certbot.pem 2024-11-14 13:26:15,297:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8581_csr-certbot.pem 2024-11-14 13:26:15,298:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:26:15,298:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:26:15,458:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:26:15,458:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:26:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SHEOpopMPXh2_7Z7L7tf4S-PjaFJTabdAl4ASExOVa4cB-n7cMI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:26:15,458:DEBUG:acme.client:Storing nonce: SHEOpopMPXh2_7Z7L7tf4S-PjaFJTabdAl4ASExOVa4cB-n7cMI 2024-11-14 13:26:15,459:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:26:15,467:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0hFT3BvcE1QWGgyXzdaN0w3dGY0Uy1QamFGSlRhYmRBbDRBU0V4T1ZhNGNCLW43Y01JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "TmzxhI642Thx9NVhx3KJ4qNK-QT8tj0GPejHha1q1eJBExLjs0BNM_c7RL6FiBAnZdT7S-kW2Xw9zas7R73rYHNmfW3nPpKfjNz-p1Uulz7ldEJYvYWjoM4upUyAIKMpV6nsh0icdbKymPwYR72HJ9aO2nS5Hjd4nz63Zx4SC4YRrIAKhnj7kLVnN2lZyYQ6yRF7uAiiyuizXv4MqrOPoMpK1ZwSm3Wa8e3nH8qSgfQPGNSWSdkJcziAogPF9QI2BDyWVytjZUIx0BX3SshhsZgBL9TI2YWhT-pMM9OhohAPOWiBPfSXwpl0YdA9cOAb6iLLJ6mf6aVPRA4xNghGvw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-14 13:26:15,656:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-14 13:26:15,657:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:26:16 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864862747 Replay-Nonce: aHUr_lcVdLAvKnwe3-lyLhOliGzF6hwKlq5xrxzStXrdstGq190 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:02:52Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864862747" } 2024-11-14 13:26:15,657:DEBUG:acme.client:Storing nonce: aHUr_lcVdLAvKnwe3-lyLhOliGzF6hwKlq5xrxzStXrdstGq190 2024-11-14 13:26:15,657:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:26:15,664:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777460087: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYUhVcl9sY1ZkTEF2S253ZTMtbHlMaE9saUd6RjZod0tscTV4cnh6U3RYcmRzdEdxMTkwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc0NjAwODcifQ", "signature": "xZZ6F6Cvbyr0-joA2rkeU9gSr8t0bfFD59X1k_31puYmAm0UzbilDFGNYnvIlhV-4vG6oF6Q5fTMOAu25cxYh2i8NM1DubknYcwDNNis0mysi1j80N04lfLc3D4JfBOcVwYAEvaxUUXsvxtdHOq3NMaAFNLp6BatZToeoWr7NuezKZJmLe_mtmTYi6WSbIF_Fd-m8OsO86ovLnh3eP8e0GM9C7YtGAbnjUWAK_QBG6908spkSf_NAGZyufBKXkbO61NpW2uQTvCm0lNqbZouheL1hOcImHi9jKQzz01O8iIPS9s7quSLU37APZKPmrf8wXkvcTrzlMnfVUVi3aFgCw", "payload": "" } 2024-11-14 13:26:15,839:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777460087 HTTP/1.1" 200 805 2024-11-14 13:26:15,840:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:26:16 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aHUr_lcVBfK01D8Tbl6rs9f88msVMvwkuDVlP28rPMXsjgw-YIo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:02:52Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/tsh-iw", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/f3c_WA", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777460087/ASfKTA", "status": "pending", "token": "gc4QnALAXB_Osd1vaxmL-PtSJQLPZ65UsOUBylgKAH8" } ] } 2024-11-14 13:26:15,840:DEBUG:acme.client:Storing nonce: aHUr_lcVBfK01D8Tbl6rs9f88msVMvwkuDVlP28rPMXsjgw-YIo 2024-11-14 13:26:15,841:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:26:15,842:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-11-14 13:26:15,842:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:26:15,842:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:26:15,843:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:26:15,844:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:26:15,844:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:26:15,844:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:26:15,845:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:26:15,886:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-11-14 13:26:16,155:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-11-14 13:26:16,156:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-11-14 13:26:16,156:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-11-14 13:26:16,161:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-12-13 19:05:32 UTC. 2024-11-14 13:26:16,161:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-11-14 13:26:16,161:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-11-14 13:26:16,166:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-11-14 13:26:16,166:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-14 13:26:16,167:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-11-14 13:26:16,171:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-11-14 13:26:16,172:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-14 13:26:16,175:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-14 13:26:16,657:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-14 13:26:16,657:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:26:17 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Hl3IJ-6k_xo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-14 13:26:16,658:INFO:certbot._internal.main:Renewing an existing certificate 2024-11-14 13:26:22,700:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8584_key-certbot.pem 2024-11-14 13:26:28,147:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8582_csr-certbot.pem 2024-11-14 13:26:28,148:DEBUG:acme.client:Requesting fresh nonce 2024-11-14 13:26:28,148:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-14 13:26:28,305:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-14 13:26:28,306:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:26:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SHEOpopMkXs_vlhB8HSi5Cbtrgkb1LoEZzw-WjcClqsPw_5FLl8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-14 13:26:28,306:DEBUG:acme.client:Storing nonce: SHEOpopMkXs_vlhB8HSi5Cbtrgkb1LoEZzw-WjcClqsPw_5FLl8 2024-11-14 13:26:28,307:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-11-14 13:26:28,313:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0hFT3BvcE1rWHNfdmxoQjhIU2k1Q2J0cmdrYjFMb0VaenctV2pjQ2xxc1B3XzVGTGw4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "M751dcTytXt4AsLi6VQ1DRHdZZE50dXOZR0ynfcMpPG9XX66lRgQlSXrVRhrkVBBkq7CWDt6k2gAvwdGrTISmGCxIGFP4e1s5WtT9j42r7JE0K8SzahDYUFW7jsoFnI5DnYXSwyaNjhDgDXz5Hl_E7K0V3SZJlCUg6lwdO0Jvsk4f4r9mP6b1qLMEhecDQ6mecuJA-nYc7B_bank5I1H_w0_GyfAbFRbnYWpu_VksSoZc5odI7e3vHHjiXF-0SG7eiHjbwdxxnEys1CddQlyyafSgXsBU3F7RHjX5nZoBZk7uuK4X_lYgGwjlK9eqPmm8PY715LtGf4ZMP8rvbsYwg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-11-14 13:26:28,498:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-11-14 13:26:28,499:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 14 Nov 2024 12:26:29 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/322864943797 Replay-Nonce: aHUr_lcVUMKtnlU7zkkZTiORTsSjjeeoQGwUMjIO7b4vweJVF7o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-21T00:03:05Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/322864943797" } 2024-11-14 13:26:28,499:DEBUG:acme.client:Storing nonce: aHUr_lcVUMKtnlU7zkkZTiORTsSjjeeoQGwUMjIO7b4vweJVF7o 2024-11-14 13:26:28,500:DEBUG:acme.client:JWS payload: b'' 2024-11-14 13:26:28,506:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/429777572397: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYUhVcl9sY1ZVTUt0bmxVN3pra1pUaU9SVHNTamplZW9RR3dVTWpJTzdiNHZ3ZUpWRjdvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80Mjk3Nzc1NzIzOTcifQ", "signature": "n5l86y_L7qIYVmEzvJWy6d_yPP5L7l55p4w79NZB4WvAT3mLXKmPF_jAy1_bUIUmfJbB4gNPQAVkCl147P4TzlCoD73dDOWfZHnTrb_02_KEdiFvS1KKzz19JiFA4FSDK9BabvkQeIf0TqJOfzqL2SK2evN6sM3ky0RbEEFwVgTHXPiIgvQQYTSjTBWWHxdKBi7HmTCg_iYd-88IsP63NeLZTW7iXslnLAbK7i31cmNAjKbHHlv7zumbAGkSUvdmnwik3uhHPwm5kwEZ-XbHqDaCP_5lczSZE7iYxvapod5DHTScvwL8ngoOOIurwwGfzG4ZBQmSMSN_ygiUqbUSig", "payload": "" } 2024-11-14 13:26:28,668:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/429777572397 HTTP/1.1" 200 805 2024-11-14 13:26:28,669:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 14 Nov 2024 12:26:29 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SHEOpopMcNtLqU1IE3vrvDt6EtKD4Wzf8Ea7Qg6ge5gyL9rMVbk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-11-21T00:03:05Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/HIxR5w", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/qQ1QMQ", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/429777572397/avR61Q", "status": "pending", "token": "YpmXYmRSK5mn1euSoGPjSLdo5ij003jXgqnsgwOJ-7o" } ] } 2024-11-14 13:26:28,669:DEBUG:acme.client:Storing nonce: SHEOpopMcNtLqU1IE3vrvDt6EtKD4Wzf8Ea7Qg6ge5gyL9rMVbk 2024-11-14 13:26:28,669:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-14 13:26:28,670:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-11-14 13:26:28,670:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-11-14 13:26:28,671:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-11-14 13:26:28,671:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:26:28,671:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-14 13:26:28,672:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-14 13:26:28,672:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-11-14 13:26:28,673:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-11-14 13:26:28,674:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-11-14 13:26:28,674:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-11-14 13:26:28,685:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-11-14 13:26:28,687:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)