2024-09-14 19:36:50,672:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-09-14 19:36:50,672:DEBUG:certbot._internal.main:Arguments: [] 2024-09-14 19:36:50,672:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-09-14 19:36:51,485:DEBUG:certbot._internal.log:Root logging level set at 20 2024-09-14 19:36:51,486:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-09-14 19:36:51,526:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-09-14 19:36:51,569:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-14 19:36:51,805:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:36:51,806:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-09-14 19:36:51,810:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-09-14 19:36:51,817:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:13 UTC. 2024-09-14 19:36:51,818:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:36:51,818:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:36:51,824:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:36:51,824:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:36:51,825:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:36:51,830:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:36:51,832:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:36:51,834:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:36:52,329:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:36:52,329:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:36:52 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "41EYk5rzmgA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:36:52,330:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:36:59,180:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8500_key-certbot.pem 2024-09-14 19:37:05,240:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8498_csr-certbot.pem 2024-09-14 19:37:05,241:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:37:05,241:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:37:05,397:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:37:05,398:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:05 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStOu0zT0e0nnRKWZI_YZ1AIyn-4XaDxXofQRk8WyMkzyA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:37:05,398:DEBUG:acme.client:Storing nonce: 0Nvv4YStOu0zT0e0nnRKWZI_YZ1AIyn-4XaDxXofQRk8WyMkzyA 2024-09-14 19:37:05,399:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:37:05,405:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RPdTB6VDBlMG5uUktXWklfWVoxQUl5bi00WGFEeFhvZlFSazhXeU1renlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ap_iChOUD2tRV7PSNoZ4iMFSLZoIp8aZU--02khOuadRu3c4z7lrOoULvf_rxeUrPtaHsnUSYq4gf-jiyQC3qKulaF7p5iV7Wy8GkTcOeWaKPeDE7xU4-NcxZskxqcsyjVhqoZ-pttH_HvqQcdxwAo-i8ZusqD6NiEvfHFRpqBOWGWz_2UUrrN8acLAxIsqWyrvQaSkCNKA6ubDFuw6wzs5l07GbtdPcamOqA1_MQWmdRS2-23xa2u7U5zvGyf0M1f8E9MLQCmeELp3nJzxoYUgihVFWOvOUC5SU3DHQpS4qqr7k5P8jONbCau1ZmgRJHL1MB4vFo3zQb_5zf3KXZQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-14 19:37:05,591:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-09-14 19:37:05,591:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:37:05 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144772916 Replay-Nonce: UAMvsxnwrO8--cloqvQh_7udZTNGrH-6pdGF2DHE-t_hMzod9Rk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:30Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144772916" } 2024-09-14 19:37:05,591:DEBUG:acme.client:Storing nonce: UAMvsxnwrO8--cloqvQh_7udZTNGrH-6pdGF2DHE-t_hMzod9Rk 2024-09-14 19:37:05,593:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:37:05,598:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndyTzgtLWNsb3F2UWhfN3VkWlROR3JILTZwZEdGMkRIRS10X2hNem9kOVJrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI1NDIzMzYifQ", "signature": "xxY7fTH4ViHxqAchtnmpw2mTPlAiX80KOEX32Pv0rT9_nBdphdKB5u94LcrzSLa4dKduqLwiyKLI2dhFfCtOGAK5XEjBYYy5MHOaj7fc1sYA8KyF5jdiPg5CFyHkgMtQTci0hQb8wWpDUjTwz2MSbdkQ8t0QKGGAGBVEhiy-9JNoiIA9Yc5H6ACTspdkRwYI-s0V2pvwYueg1BigqZIFhctvIIqMlONdTWQ4axBIU05spFWo9QKl19vYawk240CGWdXwPzOzJoR0S8tojvBhXUcOBtb4w8Y-hBAY5zgn2QQ0cPg9uiJ_EzE1Rd3CPeqvyCo7BXWoPZtcGpYZMOnbbw", "payload": "" } 2024-09-14 19:37:05,763:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122542336 HTTP/1.1" 200 810 2024-09-14 19:37:05,764:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:05 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwgTHqAGsyB3b6bfCfdyBJI1mUNauU02BUGb4LpWXJi0A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:30Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/LP3L_w", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/yxREqg", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/cyyAdg", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" } ] } 2024-09-14 19:37:05,764:DEBUG:acme.client:Storing nonce: UAMvsxnwgTHqAGsyB3b6bfCfdyBJI1mUNauU02BUGb4LpWXJi0A 2024-09-14 19:37:05,765:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:37:05,765:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-09-14 19:37:05,777:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:37:05,777:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:37:05,781:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:37:05,781:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:37:05,781:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:37:05,781:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:37:05,786:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:37:05,829:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-14 19:37:05,918:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:37:05,919:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-14 19:37:05,920:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-14 19:37:05,925:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:31 UTC. 2024-09-14 19:37:05,925:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:37:05,926:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:37:05,931:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:37:05,931:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:37:05,932:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:37:05,937:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:37:05,937:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:37:05,939:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:37:06,426:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:37:06,427:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:06 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "rOvJRate1Fo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:37:06,427:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:37:11,959:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8501_key-certbot.pem 2024-09-14 19:37:17,410:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8499_csr-certbot.pem 2024-09-14 19:37:17,410:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:37:17,411:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:37:17,573:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:37:17,573:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStlRG4iLIgiSjNrDkNTFi2bbBKyn-MXR1ml_io3Nf2-l4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:37:17,574:DEBUG:acme.client:Storing nonce: 0Nvv4YStlRG4iLIgiSjNrDkNTFi2bbBKyn-MXR1ml_io3Nf2-l4 2024-09-14 19:37:17,574:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:37:17,580:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RsUkc0aUxJZ2lTak5yRGtOVEZpMmJiQkt5bi1NWFIxbWxfaW8zTmYyLWw0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "X1KM3i21kST0sUZbSbLDewrc4stotKjLrc3QI1gURcj-i_OvK9aUR_9SB9wPiyNe9UECgFILT_t_88qgGiyQu4YNMEZFxFu04XlF1_vhOIuPbjFHvgj28KLxUX-aF8vRPFPipfRJqB7VqDb6RlOd3owArD2XJ2GdIy6d8zS-IoeeWlZwNHgD7uOmfdX0l4UD-NHJDiUXMY6MQLJ2zspR2yobxb54qk-WYcn1E5JSWUEUYgLc4Qt9okgWcpvulHhcy15DEcwoH7CVbykgyOlqsptHVfUwjs7yigxR9OzV6cQ1yj2FH0cnH9tlAn-LAJyXXHsf1x3rjaBuYIw9JqSHDg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-14 19:37:17,777:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-09-14 19:37:17,778:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:37:17 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144813576 Replay-Nonce: UAMvsxnwyslcHZbSurjy2kgzR8r1TwahUGxaft3sUsgqIPwc77A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:43Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144813576" } 2024-09-14 19:37:17,778:DEBUG:acme.client:Storing nonce: UAMvsxnwyslcHZbSurjy2kgzR8r1TwahUGxaft3sUsgqIPwc77A 2024-09-14 19:37:17,778:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:37:17,784:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bnd5c2xjSFpiU3Vyankya2d6UjhyMVR3YWhVR3hhZnQzc1VzZ3FJUHdjNzdBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2MDQxNjYifQ", "signature": "vDCA_rpx9Fz2p-5-XM7dLFKXrow4WhvBTkvkIQR-ITID_qW2tLrASukh82Kfzl9unqb-wO83iJvTIyjpsIWYxAfMY3C1VSotNGaP-I2IRslGQ5u4-ftknNC9Lnh5p9AbDM2O-YQ7TA4j5P6dbexZPKYd96FGCFpBhlsSowKxAehpM30e2uw5NYElskR5ZtlHgqwN5WPkFCexHNYRN8pS2aMMNTZxesuhqY59DEkQSa5tp4FvbzmhkptAymoKs2CWlryYbFzB0p9aEVFR0bRfyleKrRM6HROjxc6Glwr2TEx-w9AdZ3839qqg2-aSHdoFRtnv4qkOtYaBgW-iG1NXWg", "payload": "" } 2024-09-14 19:37:17,950:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122604166 HTTP/1.1" 200 804 2024-09-14 19:37:17,951:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:18 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwKsQ3DmM00HYNbCNEvYdX3zsMexJehA1rq7sRKFV4GIU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:43Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/ZP8ZRQ", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/osHCwQ", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/uKF3Wg", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" } ] } 2024-09-14 19:37:17,951:DEBUG:acme.client:Storing nonce: UAMvsxnwKsQ3DmM00HYNbCNEvYdX3zsMexJehA1rq7sRKFV4GIU 2024-09-14 19:37:17,951:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:37:17,951:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-09-14 19:37:17,953:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:37:17,953:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:37:17,954:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:37:17,954:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:37:17,954:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:37:17,954:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:37:17,956:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:37:18,009:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-14 19:37:18,318:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:37:18,319:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-14 19:37:18,320:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-14 19:37:18,325:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:49 UTC. 2024-09-14 19:37:18,325:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:37:18,326:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:37:18,331:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:37:18,331:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:37:18,331:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:37:18,335:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:37:18,336:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:37:18,338:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:37:18,780:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:37:18,780:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:18 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "mcZbsPn_MXE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:37:18,781:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:37:24,450:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8502_key-certbot.pem 2024-09-14 19:37:29,854:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8500_csr-certbot.pem 2024-09-14 19:37:29,854:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:37:29,854:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:37:30,000:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:37:30,001:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUxDGfeWvIbYlcvb1DCp6trGKgl2T6Z7xId02Ll9ZqWqI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:37:30,001:DEBUG:acme.client:Storing nonce: 4OmWUlyUxDGfeWvIbYlcvb1DCp6trGKgl2T6Z7xId02Ll9ZqWqI 2024-09-14 19:37:30,001:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:37:30,008:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVV4REdmZVd2SWJZbGN2YjFEQ3A2dHJHS2dsMlQ2Wjd4SWQwMkxsOVpxV3FJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SInZ-xFbrExctM3Cy7-nEoTXpZra3ad4R0V4bX7HUAp5hg_JwH1gpsTnQUBvKI4oY5Ur6Nt7kiu5XZpy9d8qPyqP3BA8wVRHuu0Hvbw_wAnxIpagaJZvxW5okUQslGeQ5NIpg0Aax1gIhUux05xQL-I_N0Ahlf3ybaHy2IgiD9ly2NhVHQHz-AAYL8HMKAcuN70McvVbeKCC5RxU9xSAsn_IJau0GPwweTzyk7dKKPX_rTS-FDJeNKLUvPs0dSYgPJ-qtzxwsZVmwPwolttQaiT-owjv57sX6HXlq4LrGGoM1rdyhGcOm6wS0jJjBFe41_P0N81jfaG8p3_VDjn_2Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-14 19:37:30,176:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-09-14 19:37:30,177:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:37:30 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144849776 Replay-Nonce: fCBw7MtQ9Fr546V-jbiXFdej-yo0hiNDn0lRGePm5ot1eb4oRII X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:56Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144849776" } 2024-09-14 19:37:30,177:DEBUG:acme.client:Storing nonce: fCBw7MtQ9Fr546V-jbiXFdej-yo0hiNDn0lRGePm5ot1eb4oRII 2024-09-14 19:37:30,177:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:37:30,184:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFE5RnI1NDZWLWpiaVhGZGVqLXlvMGhpTkRuMGxSR2VQbTVvdDFlYjRvUklJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2NTk1OTYifQ", "signature": "MfQvsDpmQMLMKpRBAIDxUpOkIPRGN4ik64SSewqo3jxr2odQV1bWmmTnU0te6F1rcCLhOgDLTkYIEHOgwzeln1ZNvnDGCQeR4ycvnZExmq1zQtVnBMgh5CL6pNbv9AI7TLBLg5fGgJMRwckyqaWdkzmoXBDVDdaN3QjI1dTg4LJQnWGX9pKVDrEiDYvCKh_XYw81R7IjufwJ5aCFfkMM_vi-QTeYml3k_YjH9-YXynqeaBh1Oum4e8mCXRb8Oc_B5VGIahPACkYBfkpBEf764UmexzZkZKu-4y_8EaxhpMfsHDiS8LdhvcIaCq7Y8xyvQ50NANkHIkk10buFwMns9w", "payload": "" } 2024-09-14 19:37:30,339:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122659596 HTTP/1.1" 200 807 2024-09-14 19:37:30,340:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:30 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQIQOQod_1o3qdpkmGkZkrcnPvHBgZdTRtibCI2PVwobY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:56Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/osx5jQ", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/mCb-BA", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/2L4MUQ", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" } ] } 2024-09-14 19:37:30,340:DEBUG:acme.client:Storing nonce: fCBw7MtQIQOQod_1o3qdpkmGkZkrcnPvHBgZdTRtibCI2PVwobY 2024-09-14 19:37:30,341:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:37:30,341:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-09-14 19:37:30,341:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:37:30,341:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:37:30,343:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:37:30,343:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:37:30,343:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:37:30,344:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:37:30,345:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:37:30,396:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-14 19:37:30,653:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:37:30,654:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-09-14 19:37:30,655:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-09-14 19:37:30,659:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-09-14 19:37:30,663:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:37:30,716:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-14 19:37:30,953:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:37:30,955:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-14 19:37:30,955:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-14 19:37:30,961:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:07 UTC. 2024-09-14 19:37:30,961:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:37:30,961:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:37:30,965:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:37:30,966:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:37:30,966:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:37:30,971:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:37:30,971:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:37:30,974:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:37:31,421:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:37:31,422:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:31 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "oFJxTkk3Ec0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:37:31,422:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:37:36,876:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8503_key-certbot.pem 2024-09-14 19:37:42,325:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8501_csr-certbot.pem 2024-09-14 19:37:42,325:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:37:42,325:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:37:42,475:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:37:42,476:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:42 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQiwi55-ACLkZLNEzox1HTRzZ3NXzW2600ZBZqPQh6bfo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:37:42,476:DEBUG:acme.client:Storing nonce: fCBw7MtQiwi55-ACLkZLNEzox1HTRzZ3NXzW2600ZBZqPQh6bfo 2024-09-14 19:37:42,476:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:37:42,482:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFpd2k1NS1BQ0xrWkxORXpveDFIVFJ6WjNOWHpXMjYwMFpCWnFQUWg2YmZvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "VJGxt2LQxBLuMyM5xRst_poddtaMiamSphuedel3-cDD8dXYBHRnq9IRq0v9721lYPY9xWEE-Pp2pIEOz7eQsfyDB6HMvlYRbnFJE5fiifuShhqUCmyMGjEn_NYDzrHILiLmXNJ6Xurx7sBOKqj5D-cpFiQjOTNz9KoBGWLlMlP831dFx2BqhjmnB6wQci9Akhm9bkKvYPhsjzdiJY4XvWQvrU5q7ebrmErw9SgO_hyujlavnH3TEYwQvUjlCRhs0LybglYzLgIXaQW0_Sl90w6jMmmqsh1O-x8zJmm8YTUlLI_HWUAPk5PvkffbWvL4nZPjk7FC2kRisFQlbyaOMg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-14 19:37:42,726:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-09-14 19:37:42,727:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:37:42 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144900966 Replay-Nonce: fCBw7MtQYGcPmJuGlG0t_WyChUOaw1uTVdi5zOo48zzxep4zhzk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:08Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144900966" } 2024-09-14 19:37:42,727:DEBUG:acme.client:Storing nonce: fCBw7MtQYGcPmJuGlG0t_WyChUOaw1uTVdi5zOo48zzxep4zhzk 2024-09-14 19:37:42,728:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:37:42,734:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFZR2NQbUp1R2xHMHRfV3lDaFVPYXcxdVRWZGk1ek9vNDh6enhlcDR6aHprIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3MjkwODYifQ", "signature": "S-uUjq07G4BaPE6Uo7KrNgSRH4ArEJq4wQV00aNLJizj9bhCcVQfGlMxBKh-dU2gVAjF5iYXnFCvnZFdWW0EvkMvPIdKcyCyZCY-YoDhfHRTZRToo2vi1OtiZ8X32M634CdYfzVuMw9vPf5Dy68NAzGiihQ7Lo-xQ8hV8G79VWstNcz7v9_0tZKbXzC2SViq4K0xB5Enlt8wDCfGX41qHptX71rPy4KfB5Za7NNAboIbYwjvPcZsIpkbKgeCYZRh-SmuLF7t5TYJ4EH1Cb35M7onJd76Hrboc670hMPJeCRRl04CBwGRAVXVm14xmB_R7NDQGIcGi6D_Xu7F1yG9yg", "payload": "" } 2024-09-14 19:37:42,893:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122729086 HTTP/1.1" 200 801 2024-09-14 19:37:42,893:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:42 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUsPqR54kd2xEGfa-R0gGIZLl8G5ZRIYxC8r2V7KmUQR0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:08Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/e_W2mQ", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ShHY7A", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ch6DzQ", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" } ] } 2024-09-14 19:37:42,893:DEBUG:acme.client:Storing nonce: 4OmWUlyUsPqR54kd2xEGfa-R0gGIZLl8G5ZRIYxC8r2V7KmUQR0 2024-09-14 19:37:42,894:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:37:42,894:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-09-14 19:37:42,895:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:37:42,895:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:37:42,896:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:37:42,896:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:37:42,896:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:37:42,897:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:37:42,898:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:37:42,952:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-14 19:37:43,246:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:37:43,247:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-14 19:37:43,248:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-14 19:37:43,253:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:25 UTC. 2024-09-14 19:37:43,253:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:37:43,253:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:37:43,258:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:37:43,259:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:37:43,259:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:37:43,264:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:37:43,265:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:37:43,268:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:37:43,707:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:37:43,707:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:43 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3nL9iYbTHF8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:37:43,708:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:37:49,620:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8504_key-certbot.pem 2024-09-14 19:37:55,076:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8502_csr-certbot.pem 2024-09-14 19:37:55,077:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:37:55,077:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:37:55,223:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:37:55,224:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQRR1Syf7G5QjTfBnBwul2io0kd5VypIIXVmNHDFs_a6s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:37:55,224:DEBUG:acme.client:Storing nonce: fCBw7MtQRR1Syf7G5QjTfBnBwul2io0kd5VypIIXVmNHDFs_a6s 2024-09-14 19:37:55,224:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:37:55,230:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFSUjFTeWY3RzVRalRmQm5Cd3VsMmlvMGtkNVZ5cElJWFZtTkhERnNfYTZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Dbw8Y2QQDaoa0GMqwW4riyLs5H58uMCeHEtb68NrNIsvfDRkrn8QUK5hY-8Ow80IFaZ-jxDzTCPhwjhOXAN-yPGA-bNplwlOabiir_p1PBUC9rvebBpwspe5PNbsJ3cPwnHWLMZpb6wrpu2a78xLQFClJWOOLnVDI8ky1901giysGNQCNgDK1uIw9CpBOVzFAybkvoI6rs_rWeVWXUEIgx5v-yJFJlvZX0fz1rr04U8sZ_NAIiZ5VUjxEqavkoB85sBtVKv8mVmYbFp1rIZOSwbDx0dznKo0nKQquxuqQqihe91Wg5OcPlbhcA9v5HLrGDPDovGIa7Kdq3edQu3ldw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-14 19:37:55,395:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-14 19:37:55,396:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:37:55 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144940076 Replay-Nonce: fCBw7MtQ8k0Ehx3oBr_DszDD4_ugBJRFfUQbspjoe0DoRoni8Zg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:20Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144940076" } 2024-09-14 19:37:55,396:DEBUG:acme.client:Storing nonce: fCBw7MtQ8k0Ehx3oBr_DszDD4_ugBJRFfUQbspjoe0DoRoni8Zg 2024-09-14 19:37:55,396:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:37:55,401:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFE4azBFaHgzb0JyX0RzekRENF91Z0JKUkZmVVFic3Bqb2UwRG9Sb25pOFpnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3OTAxMzYifQ", "signature": "bYBDONQ4ZobtnorMp-2DLGH_PfcWCaOAj9wGgsIcYbqC0fA9esc5IOK50pQ8wKMjwAsGtlixTU50Jh--Ag60MBOWCw5xzTeohpC7PGW3y1G2It5gZVP3UInHEOKe8gVVT7NzMHWUB6bOdRC4o5VuZNLRny8Z3iffxkfZ1o15P2fpUimE0DsLv8f--gMsQu_OYeIuOLruZNPsNaPcTENWFViJaTEvb4gMCL9z51D8IkHaRGbZ5jTJutBkKkv-VIToO9IaW5cHAE-GCpVESjqJP1mNoFSS3TJB0PCnOjIK6tXFqNtZtufp3MOmoIhbAwM6ersUKh8RKzAata3BFBbPbw", "payload": "" } 2024-09-14 19:37:55,554:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122790136 HTTP/1.1" 200 805 2024-09-14 19:37:55,555:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:55 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUFo-u-OcrsgyMK6brxN13hJ4WO_RIz2YcMUIojJ1Z6eE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:20Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/X2nDCw", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/HbiFxg", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/fCm5hA", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" } ] } 2024-09-14 19:37:55,555:DEBUG:acme.client:Storing nonce: 4OmWUlyUFo-u-OcrsgyMK6brxN13hJ4WO_RIz2YcMUIojJ1Z6eE 2024-09-14 19:37:55,556:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:37:55,556:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-09-14 19:37:55,557:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:37:55,557:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:37:55,558:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:37:55,558:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:37:55,558:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:37:55,559:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:37:55,559:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:37:55,612:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-14 19:37:55,881:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:37:55,881:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-14 19:37:55,883:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-14 19:37:55,888:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:43 UTC. 2024-09-14 19:37:55,888:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:37:55,888:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:37:55,894:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:37:55,894:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:37:55,894:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:37:55,899:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:37:55,900:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:37:55,901:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:37:57,775:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:37:57,775:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:37:57 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jSVv-Jic-Fw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:37:57,776:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:38:03,442:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8505_key-certbot.pem 2024-09-14 19:38:08,887:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8503_csr-certbot.pem 2024-09-14 19:38:08,888:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:38:08,888:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:38:09,038:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:38:09,039:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUIhwe_XWOtgUkwdvX0Tf0Wf5RwNSHaV1SHVaGf9oWVMI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:38:09,039:DEBUG:acme.client:Storing nonce: 4OmWUlyUIhwe_XWOtgUkwdvX0Tf0Wf5RwNSHaV1SHVaGf9oWVMI 2024-09-14 19:38:09,040:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:38:09,046:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVJaHdlX1hXT3RnVWt3ZHZYMFRmMFdmNVJ3TlNIYVYxU0hWYUdmOW9XVk1JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "bfk7V3TKrzjehDW8E1Y_gxibyHED2RtJ8fjqlHr2CZClqkSS1OvorOTz0KyS0AVM5FEuhenPVu3rdlDjIV96U-CdRYAPdI9htqLyHay5ssZystyXJgyM0vwtdL8f1HGEPWiX_vhksl09KoVC0UPSx4b6yLUW52y_tInr8_8YQioVNJ8ahqoICbJ3rUNNqWGwGEmytZXlZB465rtdhqi1CeftjExmaWClfqVFutFZkHXzwvmWaTqdtMb52B-Lc_eyu8YdaR-4ntwt6HdRBbembMYMo_JL2Y4tAuPDOBe4ovTwuASnXxzfrlluy4WE6mOkD4sVrFRbEOg6RC4vlJF5qQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-14 19:38:09,255:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-09-14 19:38:09,255:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:38:09 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144979426 Replay-Nonce: fCBw7MtQS1qqj9KsIXB3H65M7PlJ50gBGotz0_q5S735sBOKEXU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:33Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144979426" } 2024-09-14 19:38:09,255:DEBUG:acme.client:Storing nonce: fCBw7MtQS1qqj9KsIXB3H65M7PlJ50gBGotz0_q5S735sBOKEXU 2024-09-14 19:38:09,256:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:38:09,261:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFTMXFxajlLc0lYQjNINjVNN1BsSjUwZ0JHb3R6MF9xNVM3MzVzQk9LRVhVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI4NTExMzYifQ", "signature": "qB-ePx_aL52OaOKoo6udFKc0UdDlq8yOf1_1VY96JonHd89rfm1N3GMB43hQBQYZfWeoxRSXU4ALYFe6zgQZA1iI2H3YznebctNFarsHX4E6RSBv5nokp-_8z74tv_9SA-d68yorVKoPaWFuAx-gcB9l-SXzkNpFiJn9hshzU6XjHh3NEJ8odx9T-5cWjGcSqYZ6dmHUQRANIxayhJl-Rmdns_iynUh5waAH93nrxxO25AUmSxBNOBTAXW5p8BjIpL2ZDeeT5KcwNkOZX59FCJ-JCd2ZRayxqza85d90rk1zA3wdZVo7dn48Geg7DMoxYiZjyiy3VpTmg3otfWI7GA", "payload": "" } 2024-09-14 19:38:09,425:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122851136 HTTP/1.1" 200 809 2024-09-14 19:38:09,426:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:09 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQA2SZr2bBDcUXNy72DdEFb-EHxk9JhWL0jSBSQTBbl_Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:33Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/nTAn0w", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/Kdwo9g", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/kuyLHA", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" } ] } 2024-09-14 19:38:09,426:DEBUG:acme.client:Storing nonce: fCBw7MtQA2SZr2bBDcUXNy72DdEFb-EHxk9JhWL0jSBSQTBbl_Y 2024-09-14 19:38:09,427:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:38:09,427:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-09-14 19:38:09,428:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:38:09,428:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:38:09,429:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:38:09,429:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:38:09,429:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:38:09,430:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:38:09,431:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:38:09,481:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-14 19:38:09,731:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:38:09,732:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-09-14 19:38:09,733:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-09-14 19:38:09,737:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:14 UTC. 2024-09-14 19:38:09,737:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:38:09,738:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:38:09,742:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:38:09,742:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:38:09,743:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:38:09,748:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:38:09,749:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:38:09,750:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:38:10,232:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:38:10,232:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:10 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "mGY73gQVXr8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:38:10,233:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:38:15,719:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8506_key-certbot.pem 2024-09-14 19:38:21,117:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8504_csr-certbot.pem 2024-09-14 19:38:21,118:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:38:21,118:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:38:21,278:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:38:21,278:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YSta0fhemV0M4Ri7ptL8E_BbESjOgobLRqatdYxBGG39zE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:38:21,279:DEBUG:acme.client:Storing nonce: 0Nvv4YSta0fhemV0M4Ri7ptL8E_BbESjOgobLRqatdYxBGG39zE 2024-09-14 19:38:21,279:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:38:21,284:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RhMGZoZW1WME00Umk3cHRMOEVfQmJFU2pPZ29iTFJxYXRkWXhCR0czOXpFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PuLzEBfGKlLAZyH8l0XNf6GXT0QW3paQmYLTT9aE9IS1U10-cpwFa_uz_YqQ4qtU1x3LXDxAhPnIBLs5Ny6tI7DucJr6FYeN4-ceB8Xhq84IEBukNOioKPsqN_Q8xtUY_pCowC-xrKvu6-Afnlw31t5Zzp0aY2W_ecGcGLTxfBVVDDPysQOOjM7VhaUsYiuj2nr8Ps5CgIvmVsEbVGaXXw04OsYCogyUCzPmm1mE7BmJW_5xw7CASzWSKrQbVyJx4DFn8sF0oddeHPlVOQA-VFbIPkKzwa9afFuwekshpYNWt1nAjYw0tZPib8up8rR03oZLPyiNb88u99ji7OxAIg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-14 19:38:21,472:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-09-14 19:38:21,472:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:38:21 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145018096 Replay-Nonce: UAMvsxnwQCgUKAc4-y4eyiOjt5luJax5E7F7AWPyx6TM4DmAkvI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:45Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145018096" } 2024-09-14 19:38:21,473:DEBUG:acme.client:Storing nonce: UAMvsxnwQCgUKAc4-y4eyiOjt5luJax5E7F7AWPyx6TM4DmAkvI 2024-09-14 19:38:21,473:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:38:21,479:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndRQ2dVS0FjNC15NGV5aU9qdDVsdUpheDVFN0Y3QVdQeXg2VE00RG1Ba3ZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5MTA5OTYifQ", "signature": "icoC4dkjPShrFMRg5sNy1oIUJp5XyIWyL1TsvO2DD1NvKqxPlCi4NVnGA8mEJIdNh_vFuuzD7fCbIf-GmNAyc5ZxFBYNf4_-lDmKyIdHGNYLytLuKGyT8mwaFieJmIz-MUhBRdlk7ANyf0Em_SVj4zyomEp83qGzj2hCZYF8rWzZGcajXb4J4ixB5g8bnYHp2C55J_B5UtqSS7vh6A6ltwfAgY75-alwMHRXO0oYQz9McJ6ZszdjSHJBN3vMG_nLeBAJ9mWvKEoyyhXrSTw6Y7MDjRJLSicNfSeaVqIoSd0J0dufkUQEPgEPvHH6jJw01jTSsVchFbzN2p4mW3wlbA", "payload": "" } 2024-09-14 19:38:21,646:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122910996 HTTP/1.1" 200 807 2024-09-14 19:38:21,647:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:21 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStxEQ-gQGLv1cY2HSfeVW06b7YUr4FlTheqBqe4aGSFBs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:45Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/QNmv8g", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/Xg0Zog", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/4_hHkg", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" } ] } 2024-09-14 19:38:21,647:DEBUG:acme.client:Storing nonce: 0Nvv4YStxEQ-gQGLv1cY2HSfeVW06b7YUr4FlTheqBqe4aGSFBs 2024-09-14 19:38:21,648:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:38:21,648:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-09-14 19:38:21,649:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:38:21,649:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:38:21,650:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:38:21,650:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:38:21,650:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:38:21,651:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:38:21,652:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:38:21,703:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-14 19:38:21,975:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:38:21,977:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-14 19:38:21,977:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-14 19:38:21,983:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:33 UTC. 2024-09-14 19:38:21,983:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:38:21,983:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:38:21,989:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:38:21,989:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:38:21,989:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:38:21,994:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:38:21,995:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:38:21,996:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:38:22,465:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:38:22,466:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:22 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4nD0fwcHFDU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:38:22,466:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:38:28,024:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8507_key-certbot.pem 2024-09-14 19:38:33,434:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8505_csr-certbot.pem 2024-09-14 19:38:33,435:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:38:33,435:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:38:33,591:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:38:33,593:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwrQ-nrjfzFTVqh32nrZ9y75Jf4X8ZOicywlHj23lshno X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:38:33,593:DEBUG:acme.client:Storing nonce: UAMvsxnwrQ-nrjfzFTVqh32nrZ9y75Jf4X8ZOicywlHj23lshno 2024-09-14 19:38:33,593:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:38:33,599:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndyUS1ucmpmekZUVnFoMzJuclo5eTc1SmY0WDhaT2ljeXdsSGoyM2xzaG5vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YJkvE-QYf1tlyIeoeoIHBv6jCZnQEdoSccsN-NJn4pDVL3CJnz2bTRQu4aRd5NscpfeFGU8DQKhMbh5uc3bFMcBPEyG5PgD7LprbGu8HBmvrkpVFXcZUhercFbGUvyQ1Wx3zJGc6sp1wvIBMV8sWfAODN4SKHCrCMa6pxy4E2VSk6xiL-TTM9OPmZQrqLl60PHJK_7kMnhdspMADZdahfVXz0FAHU8H3l5kPcC7UoToG4rOII3qI-f5EK_Mz2MoSahU8WmVR7zcGzt9G6ces6NEP8Wkk_ZqeOWsrN2OadJJHS9zZyL_vU-Z-8dWHSQ6OjQQOWYkoupHrSj4VYFAIkA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-14 19:38:33,781:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-09-14 19:38:33,782:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:38:33 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145056036 Replay-Nonce: UAMvsxnwK91VtTBGRAXrctBH9OYUvTS9-ujat7nyw6-YOvOhljI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:58Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145056036" } 2024-09-14 19:38:33,782:DEBUG:acme.client:Storing nonce: UAMvsxnwK91VtTBGRAXrctBH9OYUvTS9-ujat7nyw6-YOvOhljI 2024-09-14 19:38:33,782:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:38:33,789:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndLOTFWdFRCR1JBWHJjdEJIOU9ZVXZUUzktdWphdDdueXc2LVlPdk9obGpJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5NjY5OTYifQ", "signature": "geUSWMXs2_LCCCj2958Qnq4Z5Xb-BgqqxqFAJeUBZrvkQWMNcQAPDHaN6glMxFmn4RD6xwjBXZIB31zLpbYfMu2a2_XilGxrNkXH_CAnB9Uwpk-iLASv8It7Ot2TT2w4yfP2dAV68XW6qlk2Bei2wgq_J5K6rFpbRiwCQSZF8XUI2aqVZ9GjFM3W0D8Yk7dpo5S4RiNAXj-9eKS7kiSOHSZvcjY2WClUdRp_sFaymZQwMwXYXjusyna--QZmq8DB_7OuC8GooCM1-RJayTWQ6hMhIj4ZiyYLnhxJJ5wriiY6iCqivitu4CMxYPqvdXKC3y2cI47tw2tbhDxY-zodkg", "payload": "" } 2024-09-14 19:38:33,952:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122966996 HTTP/1.1" 200 806 2024-09-14 19:38:33,953:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:34 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwqgc5uglRY5VxOw30GVGFrDgB-er_EanP6e-Ym2Yh_to X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:58Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/lsTunA", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/RuQu8g", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/9cCtaA", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" } ] } 2024-09-14 19:38:33,953:DEBUG:acme.client:Storing nonce: UAMvsxnwqgc5uglRY5VxOw30GVGFrDgB-er_EanP6e-Ym2Yh_to 2024-09-14 19:38:33,953:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:38:33,954:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-09-14 19:38:33,954:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:38:33,955:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:38:33,955:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:38:33,956:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:38:33,956:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:38:33,956:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:38:33,957:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:38:34,004:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-09-14 19:38:34,004:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:38:34,005:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-09-14 19:38:34,013:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-09-14 19:38:34,016:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-09-14 19:38:34,016:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-09-14 19:38:34,016:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-09-14 19:38:34,017:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-09-14 19:38:34,018:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-09-14 19:38:34,063:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-14 19:38:34,086:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:38:34,087:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-14 19:38:34,088:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-14 19:38:34,093:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:53 UTC. 2024-09-14 19:38:34,093:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:38:34,093:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:38:34,099:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:38:34,099:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:38:34,099:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:38:34,104:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:38:34,104:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:38:34,106:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:38:34,581:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:38:34,582:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:34 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "d_s4ZU1aXKs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:38:34,582:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:38:40,059:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8508_key-certbot.pem 2024-09-14 19:38:45,473:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8506_csr-certbot.pem 2024-09-14 19:38:45,473:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:38:45,473:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:38:45,630:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:38:45,630:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwQzTTp8DkQICFOqIvq9xBppTqz7_ufMC9KcIgPPEW9ow X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:38:45,630:DEBUG:acme.client:Storing nonce: UAMvsxnwQzTTp8DkQICFOqIvq9xBppTqz7_ufMC9KcIgPPEW9ow 2024-09-14 19:38:45,631:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:38:45,637:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndRelRUcDhEa1FJQ0ZPcUl2cTl4QnBwVHF6N191Zk1DOUtjSWdQUEVXOW93IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "WPWYvoKMBMcBkGj-r2HD9FQOlXh9HgVDP9PzmL7M5dipvakJXtpXgI9c1QWsoi3Do0Cb26hCoMj8tWDOns5EDd8Bzht9m6v4m3RiYGQF31aTcocGDMG4QpG-1M-XhJpryoClMp-7L-M8yhHMjqgWEoQ3QVYbxJal3b63HGIv-TFcmgEEeytuQku7ERPVUdAYmo6kXdz2jFVFCVmlShAmruxZ8LPgtv6ltlDpYJvwGe-7-XdUBESByCcRh8ozHMt1nzZceCFOP87XU0WYnXt3l2Y2bcE-VnFRZ_zfTt7SnKZx2aQqo9gcTQCjryhCwMuxudrWVPuOwicekqEW4HCeEg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-14 19:38:45,828:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-09-14 19:38:45,829:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:38:45 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145110166 Replay-Nonce: 0Nvv4YStox9Yn9yS1P6w48HaKoHuJqxbLNNQOrtwu29b2Pdq0dc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:11Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145110166" } 2024-09-14 19:38:45,829:DEBUG:acme.client:Storing nonce: 0Nvv4YStox9Yn9yS1P6w48HaKoHuJqxbLNNQOrtwu29b2Pdq0dc 2024-09-14 19:38:45,830:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:38:45,836:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RveDlZbjl5UzFQNnc0OEhhS29IdUpxeGJMTk5RT3J0d3UyOWIyUGRxMGRjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMwNDM0ODYifQ", "signature": "PGAKWhCDKkpHkFLqUFTsBGfxsXBurW0CMPDEjMzsmkcyCqs4BdYVVTK2IqOwnWbU1ZjZ19yyhha7sP4W1zc7mJfEMVJ9z6-Ci8wY4xWFeOX-pwRT-skf6B23dgvqWBcnWq5G1s2XSF0hFMWNg1G_gQoVlPK3fUUIMURyvHKNNo3xUNOfV0IxSRClp1NHM_rOoAOepOM-SWg_1CFOHIOwTjKHAD5RqAh7ndP6TAzGOMGssrzcAsBRNjf3HXJZrkfhac0o3ytNZuarKfxLD_5lWWk2ry7Urw6kzaBKzt_yyZQLQS81nQbZi91_9cSHhD0fQWS2brGrvHpKlLUMzlKz8A", "payload": "" } 2024-09-14 19:38:45,999:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123043486 HTTP/1.1" 200 811 2024-09-14 19:38:45,999:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:46 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStTRWgum4kHRu06GGsVHnFh6mmJDSH9sKhIsSeDbUgCps X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:11Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/5SnKCA", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/oHWByA", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/6UDG0g", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" } ] } 2024-09-14 19:38:46,000:DEBUG:acme.client:Storing nonce: 0Nvv4YStTRWgum4kHRu06GGsVHnFh6mmJDSH9sKhIsSeDbUgCps 2024-09-14 19:38:46,000:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:38:46,001:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-09-14 19:38:46,001:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:38:46,001:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:38:46,001:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:38:46,003:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:38:46,003:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:38:46,003:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:38:46,004:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:38:46,063:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-14 19:38:46,190:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:38:46,191:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-14 19:38:46,192:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-14 19:38:46,199:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:20 UTC. 2024-09-14 19:38:46,199:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:38:46,200:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:38:46,205:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:38:46,206:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:38:46,206:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:38:46,210:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:38:46,211:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:38:46,214:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:38:46,667:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:38:46,668:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:46 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "H6SRTeElTp0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:38:46,668:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:38:52,337:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8509_key-certbot.pem 2024-09-14 19:38:57,806:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8507_csr-certbot.pem 2024-09-14 19:38:57,807:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:38:57,807:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:38:57,957:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:38:57,957:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQDJvnsZiuzy5kHUXX80Vl67PeArZsL3ozMPcN3G_dVUQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:38:57,958:DEBUG:acme.client:Storing nonce: fCBw7MtQDJvnsZiuzy5kHUXX80Vl67PeArZsL3ozMPcN3G_dVUQ 2024-09-14 19:38:57,958:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:38:57,965:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFESnZuc1ppdXp5NWtIVVhYODBWbDY3UGVBclpzTDNvek1QY04zR19kVlVRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mx1dbrup_DaoCM_5gVzx61g8W-fGLEsqPnzJpul03jSaq0x_MIhZBRwI3StyI8UJfyYI38qJD4euOtEk4tSV3Yg7HB3mSSdeao0ACV6ty8OxzAPMZMUCru8n6c89y4o6lHQrdDel2z1LsyswIzJNGHXT3o7pv9DUQLwwEUeHr_r4zfDiz4UanIFcx6wZzWqTKmfYniDgLayBHV20U3DB6vom-VkHVmlgR9rtgexNr2YX0BZ3L-ruMeQEhG60m50LeVs54UUayOwBJMwAnekQo9C1V5-d3scHDgBmuNlKULkeO4_dCzM7Q3gXNw_Mkj9c0DeSqYR0vuYPtcU_71RbHg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-14 19:38:58,166:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-09-14 19:38:58,166:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:38:58 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145156016 Replay-Nonce: 4OmWUlyUwfnCyKbRoAnKIckZVO8Rq7SbK1Dq3JAoPBP4ZHZNjzQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:24Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145156016" } 2024-09-14 19:38:58,167:DEBUG:acme.client:Storing nonce: 4OmWUlyUwfnCyKbRoAnKIckZVO8Rq7SbK1Dq3JAoPBP4ZHZNjzQ 2024-09-14 19:38:58,167:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:38:58,173:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVV3Zm5DeUtiUm9BbktJY2taVk84UnE3U2JLMURxM0pBb1BCUDRaSFpOanpRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxMTQzNjYifQ", "signature": "MyYmyMORmcmfYP2hoiUF8y5b1hXeAseEJQeGmj1lf9P6R5yn58t7gWvBV2tvdw8h9aGvcXIF7epnWZ2vX5bxBhJecHnWPoB1JejQ8pIEcN1h8VK3SZ0eO-rFxpjohbUOPH9mZ3p7gfStDbs4BLYq_mKS4SVOSQVJYX7dpLQkDizfO_xq4UGrifrWwX86fdKTUqHRt_WUB3fp94pG1etVeT5HR9_sW64WGtH5gOTd4xY00uX4cjE2yvnlLV2UjSUdBbAYInVLgsMVu9MzFmjVHGVPHraD-bdPz2BZiVP3zznVBsiWgMlm2D98T1kDN6uKKx94iWE3MpjlxdhlHxlPqw", "payload": "" } 2024-09-14 19:38:58,329:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123114366 HTTP/1.1" 200 810 2024-09-14 19:38:58,329:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:58 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUoNwyPQcb36eNS7PWG50U6n5BIVtywX4fB9ZRol5F_kk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:24Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/hpZofw", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/K6FLfA", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/0k48SQ", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" } ] } 2024-09-14 19:38:58,330:DEBUG:acme.client:Storing nonce: 4OmWUlyUoNwyPQcb36eNS7PWG50U6n5BIVtywX4fB9ZRol5F_kk 2024-09-14 19:38:58,330:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:38:58,331:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-09-14 19:38:58,331:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:38:58,331:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:38:58,333:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:38:58,333:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:38:58,333:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:38:58,334:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:38:58,335:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:38:58,373:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-14 19:38:58,635:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:38:58,637:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-09-14 19:38:58,637:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-09-14 19:38:58,641:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:39 UTC. 2024-09-14 19:38:58,641:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:38:58,643:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:38:58,648:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:38:58,648:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:38:58,648:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:38:58,653:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:38:58,654:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:38:58,656:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:38:59,090:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:38:59,090:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:38:59 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "SWooIWgbluM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:38:59,091:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:39:04,726:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8510_key-certbot.pem 2024-09-14 19:39:10,140:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8508_csr-certbot.pem 2024-09-14 19:39:10,140:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:39:10,140:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:39:10,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:39:10,286:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:39:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQyMWZYGYe5Q3LEkTmHXOWV1ku0Xz-uWD_Z18Ga-hGYB8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:39:10,286:DEBUG:acme.client:Storing nonce: fCBw7MtQyMWZYGYe5Q3LEkTmHXOWV1ku0Xz-uWD_Z18Ga-hGYB8 2024-09-14 19:39:10,288:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:39:10,295:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFF5TVdaWUdZZTVRM0xFa1RtSFhPV1Yxa3UwWHotdVdEX1oxOEdhLWhHWUI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nDdd8WLjGy1AgLAkD9_IcdvCsWx6Nx_ssvlrRHWbfdcc5P62DzfTBvRP4EOlt-LO-4Mh5SXwKzTdI-EeKVj7UOXc5Ege1zahqaZvovmH8AwYW1lsHDj-iE_ChMs7-JDfUjfKSnBVcXtzFLSiETjRKO2GhUqL4_bmhQ53bbZ2r-nThUEBK4GfUmicR9HUseL8uri3zr1qr6i-i1Ct0LrPyK3_5-5SfuPtfLcqIQsnlqJORq36l7__6F_I86cl--pZOfoUv1szTR5qwf7DN4-47xFoLW72iquXCu0WC8v31dYu5tPdxRm19z6HM0ZC3DOPc_73ObBpqKzkM4a5yQ-Ctg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-14 19:39:10,495:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-09-14 19:39:10,496:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:39:10 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145193816 Replay-Nonce: 4OmWUlyUoB5eM5QZBWhjntgdUAmp5RInB5bj679MfRa03S8Z6BY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:37Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145193816" } 2024-09-14 19:39:10,496:DEBUG:acme.client:Storing nonce: 4OmWUlyUoB5eM5QZBWhjntgdUAmp5RInB5bj679MfRa03S8Z6BY 2024-09-14 19:39:10,496:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:39:10,502:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVvQjVlTTVRWkJXaGpudGdkVUFtcDVSSW5CNWJqNjc5TWZSYTAzUzhaNkJZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxNzMyODYifQ", "signature": "b2pj0xPU96FRFw75S3pnzvwh8hJQrLo5qSnrKGfQ5R4Qg--vLiTzCvT7J-UbYjKMMp0U9Hfu3f7GL1LozW2OpMHqhEvhtmDYZ7rBVT-8o8kH9UhagrmKVAhTFVxmPFJYDlViEtvnAVwqE_hbbWdFnI2EtvkI5XkyWae0LvQ98-ZY1X1cj986pvYkIqkj47P6Czuj_0Ap0jN3H9BbjGkoc9VaJgEApgOMJAPfaLxwaauUbcOX9Wu6ArX8EUh-0V1Q_acPbGdXQxz13_Gv9f_4FQGeayPDt__Gnjjff63fSTD984Lr-VC-XTckUKLNTeckLbNRgPNL31cPJubWrsA2fw", "payload": "" } 2024-09-14 19:39:10,668:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123173286 HTTP/1.1" 200 809 2024-09-14 19:39:10,669:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:39:10 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQujj7GXoe75mnkifXLf51WKiAk7TPPaLWCz9QUJVjrIM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:37Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/S6yiLg", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/QeJIqg", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/xZ9qpw", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" } ] } 2024-09-14 19:39:10,669:DEBUG:acme.client:Storing nonce: fCBw7MtQujj7GXoe75mnkifXLf51WKiAk7TPPaLWCz9QUJVjrIM 2024-09-14 19:39:10,669:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:39:10,670:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-09-14 19:39:10,670:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:39:10,670:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:39:10,671:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:39:10,672:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:39:10,672:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:39:10,672:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:39:10,673:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:39:10,724:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-14 19:39:10,908:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:39:10,909:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-09-14 19:39:10,910:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-09-14 19:39:10,915:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:57 UTC. 2024-09-14 19:39:10,915:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:39:10,915:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:39:10,920:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:39:10,921:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:39:10,921:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:39:10,926:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:39:10,926:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:39:10,928:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:39:11,411:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:39:11,412:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:39:11 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HacbLzZN6p8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:39:11,412:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:39:16,961:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8511_key-certbot.pem 2024-09-14 19:39:22,416:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8509_csr-certbot.pem 2024-09-14 19:39:22,417:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:39:22,417:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:39:22,578:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:39:22,579:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:39:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwLXJElDWwGOauB1JbSaHOtqkaT-uQyo6n4eWtc-YR39c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:39:22,579:DEBUG:acme.client:Storing nonce: UAMvsxnwLXJElDWwGOauB1JbSaHOtqkaT-uQyo6n4eWtc-YR39c 2024-09-14 19:39:22,580:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:39:22,585:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndMWEpFbERXd0dPYXVCMUpiU2FIT3Rxa2FULXVReW82bjRlV3RjLVlSMzljIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YVhiq6bje9Gb65C5joh4ACVFWTBFmt9QAShYpJz7syigdeCjEbQTaXjmVCs2CeOO4mPnQNKxzQkWgIYauUV6ScSW-R4RDfBHiD_B2wcxKcxuEzBzuOwGSoO7MxLpZF66i4e2_boSypt55mnfUkP_HSKfNdFYPBaCGxIy-bZCyVQ8zXGbD1iCc11UGobIHzhQ6vgyyb4JyShZD6XRXP7CHWkTfa8LBkWBJgxabs-CiQH_3_3ArZ0dFBk0LlvXuzbeZIZYc9LJhm9FmpoNbdXW1gR-kuYCPVVX2_MHWGY0Q2Q5WHRiVtstBBWQCifHJfyPl3aCUesZ2tTHc8cNX0aGoA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-14 19:39:22,773:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-14 19:39:22,774:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:39:22 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145229456 Replay-Nonce: 0Nvv4YStnngCGF_BBv6wZGOD9Myb_eGcc1wL1T6WrP6UY9sHU5M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:49Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145229456" } 2024-09-14 19:39:22,774:DEBUG:acme.client:Storing nonce: 0Nvv4YStnngCGF_BBv6wZGOD9Myb_eGcc1wL1T6WrP6UY9sHU5M 2024-09-14 19:39:22,774:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:39:22,780:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RubmdDR0ZfQkJ2NndaR09EOU15Yl9lR2NjMXdMMVQ2V3JQNlVZOXNIVTVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyMjk1MDYifQ", "signature": "ubj1wYPEeaG5veK7rj6UgWmGzuIA9_OI6Df6iFBYjKX3tfO-7O-nv6aFuVaF1DpLnSoBLMALz4Pa4Kl27haoGwJZ1rAPznHFnNcYsQE63OybE2HF65eIWJrT3BdQQCQ99XvntReo-NP3KWC0T4GnSDGz5MuSIuL5jCYabMS1tDjqMHB5WTSGtvedwT94reQTxwavvP20cyinh6hY9m8mXyU3kZ6K88vEJFYSLDqIzo2OOceBZvgOagIC-ITuu-NE40xITrzBy6eAkoMNVsOXoDcIiEVUGNXscLnE_BEKvk9uxuV4JYW2QhqWa-pCDhjzilbkzSQfWof6R_meKeNahA", "payload": "" } 2024-09-14 19:39:22,948:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123229506 HTTP/1.1" 200 805 2024-09-14 19:39:22,948:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:39:23 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwvgSJbhGiw5RxKNPxCXvzrgjZDIoLgyw9tBc5UN4zPAs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:49Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/K5UDEQ", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/yzBBsQ", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/gbt7DA", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" } ] } 2024-09-14 19:39:22,949:DEBUG:acme.client:Storing nonce: UAMvsxnwvgSJbhGiw5RxKNPxCXvzrgjZDIoLgyw9tBc5UN4zPAs 2024-09-14 19:39:22,949:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:39:22,950:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-09-14 19:39:22,950:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:39:22,950:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:39:22,951:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:39:22,951:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:39:22,951:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:39:22,952:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:39:22,953:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:39:23,007:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-14 19:39:23,274:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:39:23,275:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-14 19:39:23,276:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-14 19:39:23,280:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:15 UTC. 2024-09-14 19:39:23,280:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:39:23,281:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:39:23,286:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:39:23,286:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:39:23,286:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:39:23,291:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:39:23,293:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:39:23,295:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:39:23,730:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:39:23,731:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:39:23 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HPd_w_a4Qyo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:39:23,731:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:39:29,281:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8512_key-certbot.pem 2024-09-14 19:39:34,789:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8510_csr-certbot.pem 2024-09-14 19:39:34,789:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:39:34,790:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:39:34,936:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:39:34,937:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:39:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQERavtwVKGFeyJ2-EhBfKGdS4E9lqUAoMBulsJpJCYWI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:39:34,937:DEBUG:acme.client:Storing nonce: fCBw7MtQERavtwVKGFeyJ2-EhBfKGdS4E9lqUAoMBulsJpJCYWI 2024-09-14 19:39:34,937:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:39:34,944:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFFUmF2dHdWS0dGZXlKMi1FaEJmS0dkUzRFOWxxVUFvTUJ1bHNKcEpDWVdJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qJki6QZ25GKiTm8s5MIF7QR1_scO_vXvt4qWeWWE3JfG1-t7I74Doz530CrpZhF5iVJC0r5j9jz8Az_aOy-NHeOTJBT88Km7RtkuNU6s0Euc1mfNgCQmkSGU_sqa62panjSdZGzEkhgaZzBwO_z3GN5noyQcbWDYkBANm1MrIIA3lH-WvQIf9ai8Mb_wD8ZgBoyBgV9_EiZ9decmJccPHZBPxirf2dF8G7LILNlh6liFkWyV6cqhEVp0rINssH79ugy7uuTVVH0ddbRsKiEMGSoNUbM-ev3MnfGijoNgTUXNwzaa6lb7Jts3Z9TRZRmEdOtkOHtSwLBZyb4bJelVWg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-14 19:39:35,199:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-14 19:39:35,200:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:39:35 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145265276 Replay-Nonce: fCBw7MtQxgnq6Gkr7Fp7hSCN4WSLwFFBorQiXsd8E7gnEleAOLA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:57:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145265276" } 2024-09-14 19:39:35,200:DEBUG:acme.client:Storing nonce: fCBw7MtQxgnq6Gkr7Fp7hSCN4WSLwFFBorQiXsd8E7gnEleAOLA 2024-09-14 19:39:35,201:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:39:35,207:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFF4Z25xNkdrcjdGcDdoU0NONFdTTHdGRkJvclFpWHNkOEU3Z25FbGVBT0xBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyODY1ODYifQ", "signature": "MKFbzpQeRFUsOPV7em29l45yrna1IRrz9MjzBcyQHnrRMmbb2zqD_8_Y3zYiw_JZIt_j6_Mx1_qPaZS06puiNO6yomX1_JEERpfOSbyBCW-Pls0ujacN6j17TGgMn3rcrh1J_5RAFz7r2hlgN544SzOUN_HZc3jISKFxFkedx1DXX0yINSLeXhUOaF_N2Wx-ZQO0nJXHzHAk10TQgeDo2ZmfeU43mphVS3ndiz5myrSX8GcpA1DBnDQXhtR2rYGXLboNfFEfiEm__ermVPF4e0PauqtcDQvfvMY7na9ChOnZgHmLWwOTyxPHKg1ReEiVDbwG2rNnNYIUanLUcf1cQQ", "payload": "" } 2024-09-14 19:39:35,374:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123286586 HTTP/1.1" 200 805 2024-09-14 19:39:35,375:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:39:35 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQ0gowNEXZRAPfw1p93H0SFcgkOrz9inD4Jvq4II_7JDs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:57:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/S9gNtg", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/B20YQg", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/dinKKw", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" } ] } 2024-09-14 19:39:35,375:DEBUG:acme.client:Storing nonce: fCBw7MtQ0gowNEXZRAPfw1p93H0SFcgkOrz9inD4Jvq4II_7JDs 2024-09-14 19:39:35,376:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:39:35,376:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-09-14 19:39:35,377:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:39:35,377:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:39:35,378:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:39:35,378:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:39:35,378:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:39:35,379:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:39:35,380:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:39:35,421:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-14 19:39:35,699:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-14 19:39:35,700:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-14 19:39:35,701:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-14 19:39:35,706:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:30 UTC. 2024-09-14 19:39:35,706:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-14 19:39:35,706:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-14 19:39:35,711:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-14 19:39:35,711:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-14 19:39:35,713:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-14 19:39:35,717:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-14 19:39:35,718:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-14 19:39:35,721:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-14 19:39:36,189:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-14 19:39:36,189:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:39:36 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CIJj6PZsgpk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-14 19:39:36,190:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-14 19:39:41,886:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8513_key-certbot.pem 2024-09-14 19:39:47,383:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8511_csr-certbot.pem 2024-09-14 19:39:47,385:DEBUG:acme.client:Requesting fresh nonce 2024-09-14 19:39:47,385:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-14 19:39:47,542:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-14 19:39:47,542:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:39:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStH7o88RUeMdTGi_hv_miTIqi_p-8fnEumcFmGJYVDBrw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-14 19:39:47,543:DEBUG:acme.client:Storing nonce: 0Nvv4YStH7o88RUeMdTGi_hv_miTIqi_p-8fnEumcFmGJYVDBrw 2024-09-14 19:39:47,543:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-09-14 19:39:47,549:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RIN284OFJVZU1kVEdpX2h2X21pVElxaV9wLThmbkV1bWNGbUdKWVZEQnJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "n8MZFwqB5u-BLTAtC8xXGr8i0YzqhjkVzVn35TMxhlIzhIoxxrTq1U4WLUkDvJY2h2KIoRo6BO5nu3jPdGNjNg13X3fN_xax3Rzvu6qD7bQ8nQq0k6JUCj9OMTiqiO93kdtAbbbEpSis2_K5jMZJ3SJMHo5Jzb2xtD4zhA6jkTvoEy1Wz1lAPYcOZXUpeYCBOMgcrNGUBBlXmzQarwa2b1KWNk74DJFkqAhBCqjDlCbl0x7icsKsfIDFxxneHxxRAEEYgBe6POJHqYktEOJ3BooIZRO7ZOv6kWiQnSyVz9jnlD-OhShekzesHazu3_2QbndtoM9A1l5F2DjGndZhEQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-14 19:39:47,733:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-14 19:39:47,735:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 14 Sep 2024 17:39:47 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145319296 Replay-Nonce: 0Nvv4YStN4JVwMxR4NyYEEO4YI0lJR32GhHfUE7saqmguQ7bGYs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:57:14Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145319296" } 2024-09-14 19:39:47,735:DEBUG:acme.client:Storing nonce: 0Nvv4YStN4JVwMxR4NyYEEO4YI0lJR32GhHfUE7saqmguQ7bGYs 2024-09-14 19:39:47,736:DEBUG:acme.client:JWS payload: b'' 2024-09-14 19:39:47,741:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RONEpWd014UjROeVlFRU80WUkwbEpSMzJHaEhmVUU3c2FxbWd1UTdiR1lzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMzNjQ2MDYifQ", "signature": "vz9Utd5cakRTitUkydqQem-m9luF5YoogOY4F-Nc_996GjpFzFiUWMC6-uUBrlru-oeANwt499VwutWsV4VjGOvJ5bBz3Fdq7oY2-8fLCviEUxWqggi-5WW90w-FZlRj0SPjJ2Z72G1cl1X0pXsz6foi1g9L4Wov-P0vJt5KgNUAQcInyWAwdK3vMRlRoSSu2JkNhTE0nhUu9cGSy4Mf3ddPYX2keehkSV77Oh7WkA-ioDBPM6KODE9cN4hZ2wV4NvTNqLfj7J57lVvzDNOuDcP9p7VqyGD5gVoCWw_ZoXmsqI7dL59yMEzVcItVR_JU_B7-yJe91ZmKLq81-6P8ow", "payload": "" } 2024-09-14 19:39:47,903:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123364606 HTTP/1.1" 200 805 2024-09-14 19:39:47,905:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 14 Sep 2024 17:39:47 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwy_OUTUVjnvps6XUUXrodvJgSfG_GogcCG6gQa2i9UAw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:57:14Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/ndw7tA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/DMnfUA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/LOiTWA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" } ] } 2024-09-14 19:39:47,906:DEBUG:acme.client:Storing nonce: UAMvsxnwy_OUTUVjnvps6XUUXrodvJgSfG_GogcCG6gQa2i9UAw 2024-09-14 19:39:47,906:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-14 19:39:47,906:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-09-14 19:39:47,907:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-14 19:39:47,907:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-14 19:39:47,908:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:39:47,908:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-14 19:39:47,908:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-14 19:39:47,909:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-14 19:39:47,910:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-14 19:39:47,910:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-09-14 19:39:47,910:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-09-14 19:39:47,911:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-09-14 19:39:47,913:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)