2024-09-13 17:16:28,806:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-09-13 17:16:28,806:DEBUG:certbot._internal.main:Arguments: [] 2024-09-13 17:16:28,807:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-09-13 17:16:29,645:DEBUG:certbot._internal.log:Root logging level set at 20 2024-09-13 17:16:29,646:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-09-13 17:16:29,688:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-09-13 17:16:29,740:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 17:16:29,946:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:16:29,948:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-09-13 17:16:29,953:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-09-13 17:16:29,962:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:13 UTC. 2024-09-13 17:16:29,962:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:16:29,962:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:16:29,967:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:16:29,968:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:16:29,968:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:16:29,975:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:16:29,976:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:16:29,978:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:16:30,450:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:16:30,451:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:16:31 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-e4lvjSYXYo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 17:16:30,451:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:16:37,230:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8486_key-certbot.pem 2024-09-13 17:16:43,524:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8484_csr-certbot.pem 2024-09-13 17:16:43,524:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:16:43,524:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:16:43,678:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:16:43,679:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:16:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YSttwpEwK9hlkHU0VG5nP09TFAbIS5a6cCl_9C-amcUDRs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:16:43,679:DEBUG:acme.client:Storing nonce: 0Nvv4YSttwpEwK9hlkHU0VG5nP09TFAbIS5a6cCl_9C-amcUDRs 2024-09-13 17:16:43,679:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:16:43,686:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3R0d3BFd0s5aGxrSFUwVkc1blAwOVRGQWJJUzVhNmNDbF85Qy1hbWNVRFJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "VzsXESHPUIM7Fu-BU8CDi4enXX_lEhPsBO47WiV-HdV3tNFpDd2h7V2i4XkxHnTUOUM0hlv9qsVKuK5IS1TmktBtOtlzTLOdeva4FS4PEjM_-8NdxRMFcKL7e4YjDunzVZMhJwj2yNOfQtmYoI_M4MMamAZWO9eLMwhx0AVcVfkI1xzerVzdlZPkq6FM_viiK6wcDuPqLLCZ-91UFx0HvUUzDTeuu5J9kvyo2hdjncSJ88O9rFmE6epszN4TPWrZbZWysOpWH_ilHFyeU3y_z-QdyRSdYajEV3oJ1EOOG3niIbubDMz90sLRs4wafJmvk-DLWXAlw3KdQfSi6ON6Nw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-13 17:16:43,865:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-09-13 17:16:43,865:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:16:45 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144772916 Replay-Nonce: 0Nvv4YStSQEtPeKmcB12FNIZjdgG2r4u3OnUv6sS6PVKzCVqPOQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:30Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144772916" } 2024-09-13 17:16:43,865:DEBUG:acme.client:Storing nonce: 0Nvv4YStSQEtPeKmcB12FNIZjdgG2r4u3OnUv6sS6PVKzCVqPOQ 2024-09-13 17:16:43,866:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:16:43,871:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RTUUV0UGVLbWNCMTJGTklaamRnRzJyNHUzT25VdjZzUzZQVkt6Q1ZxUE9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI1NDIzMzYifQ", "signature": "AvJAeRmdZQyXWQ4VfKx1CTb2H83yLii3YE0Y8kkVqdEJuArmUCg-_EmYd9LwWkPX-ZjEipQOFshC5nZtpJhgWM6KDWoxE-1DWRcTl1GnJADK2GqjQI5V8ehLBBw4tIpJew43STKEbtsW0Su9y_GxwIBuG2388DJKYH6ik5MdxQaIej3er3UfKCZVjQdB94QfTvaltFaSfw6LzIli6FsqnUnPqxH57X0MIMS97gve0_8dxolJAfiaSFg17CZlqrgp66yaM2A4vdqoO0t4v_0XoH6nP85ABVtyKu05T2gDIce-rGklf-8A5GBCErixqJEquapw_6GSRlvSBsbx9Lj-tw", "payload": "" } 2024-09-13 17:16:44,031:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122542336 HTTP/1.1" 200 810 2024-09-13 17:16:44,032:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:16:45 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStpCWVS5Tt1eFGeAe3aV2a8lPkLtJq2TN8SV4llL_I7FY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:30Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/yxREqg", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/LP3L_w", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/cyyAdg", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" } ] } 2024-09-13 17:16:44,032:DEBUG:acme.client:Storing nonce: 0Nvv4YStpCWVS5Tt1eFGeAe3aV2a8lPkLtJq2TN8SV4llL_I7FY 2024-09-13 17:16:44,033:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:16:44,033:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-09-13 17:16:44,034:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:16:44,034:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:16:44,038:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:16:44,038:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:16:44,038:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:16:44,038:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:16:44,043:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:16:44,086:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 17:16:44,272:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:16:44,273:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 17:16:44,274:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 17:16:44,279:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:31 UTC. 2024-09-13 17:16:44,279:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:16:44,279:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:16:44,284:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:16:44,284:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:16:44,285:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:16:44,295:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:16:44,295:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:16:44,298:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:16:44,724:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:16:44,724:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:16:45 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-Vd6ixXkuj8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 17:16:44,726:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:16:51,011:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8487_key-certbot.pem 2024-09-13 17:16:56,923:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8485_csr-certbot.pem 2024-09-13 17:16:56,924:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:16:56,924:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:16:57,067:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:16:57,067:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:16:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUhWwUOTRIaHueeePgfjefHNA8YFrgfvw-hnsfYRPQwzQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:16:57,069:DEBUG:acme.client:Storing nonce: 4OmWUlyUhWwUOTRIaHueeePgfjefHNA8YFrgfvw-hnsfYRPQwzQ 2024-09-13 17:16:57,069:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:16:57,074:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVoV3dVT1RSSWFIdWVlZVBnZmplZkhOQThZRnJnZnZ3LWhuc2ZZUlBRd3pRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BboyGqqdgJmGqqMwd1oa_WHjYxrZtxXnIyZ7ficfCQZWaPeHjIII9JDgssmmmfTyGGvAKOM8-GVbNDu3G6RgTOC6T202pWzD7bvaUA7bkVVKjy6GCrFtusljDuGAKwMpUQ31mWQYPKJzN-c8ZMFpwF51YweIHyusFDM-tjskPVveaSptC4BO_KQD09mDFeX3y2YyyYC3B_U5i-KOTgfsh4TFvrGWg1dnKw0mwE8micjkZ8zsvd3yp1XMhffeDIT4B3FhdIHgbegquf7Qxc8nJ9E1GRM8q6ZshDlOY4fpd6zUXxy8J3Xup6wPhbKl63QfJVMgxDb-Vr8B6iZ6497AEw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-13 17:16:57,260:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-09-13 17:16:57,261:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:16:58 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144813576 Replay-Nonce: fCBw7MtQO0cFHQxoJWkWrKGnlXEJYHtvAib9AduZeibELyS5cmw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:43Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144813576" } 2024-09-13 17:16:57,261:DEBUG:acme.client:Storing nonce: fCBw7MtQO0cFHQxoJWkWrKGnlXEJYHtvAib9AduZeibELyS5cmw 2024-09-13 17:16:57,261:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:16:57,267:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFPMGNGSFF4b0pXa1dyS0dubFhFSllIdHZBaWI5QWR1WmVpYkVMeVM1Y213IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2MDQxNjYifQ", "signature": "ualya2vI-QFX-NcMV6WhUe57DhFLVpwMdAzSv1LZg0MfUU2m8t_1UZClgUoeyX0pi3AqaPwHwLLuaozoDcOtvTElf1kkrpRLZc6POeD9inDbtZM7bANMm0lkVJb91Cd7CqeNHs4_v-1NPGTRLcUteOwsTXZu8ahTYpY1w_FUJN5pYtBcDRL-Eape7_s3KAwMlk43bnY9f0m42TQWb4yUSwGybCWcR2fOZa_eB4EU98MQbbVBvHB0V0O16JsfAhQE5fmxZpnl9ZV-5K5azc7SeLYfG1pcNbsc5SUD_XbH1_poNaeLpbhpksq3knZeYKIaHccRp5aH82FDMrJLDtoOYA", "payload": "" } 2024-09-13 17:16:57,433:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122604166 HTTP/1.1" 200 804 2024-09-13 17:16:57,434:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:16:58 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUPenCsC1aSACfaUI-4ZmUpl9U4tcsNgvK2W-PyQIbCiA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:43Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/ZP8ZRQ", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/osHCwQ", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/uKF3Wg", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" } ] } 2024-09-13 17:16:57,434:DEBUG:acme.client:Storing nonce: 4OmWUlyUPenCsC1aSACfaUI-4ZmUpl9U4tcsNgvK2W-PyQIbCiA 2024-09-13 17:16:57,435:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:16:57,435:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-09-13 17:16:57,436:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:16:57,436:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:16:57,437:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:16:57,437:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:16:57,437:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:16:57,437:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:16:57,438:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:16:57,482:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 17:16:58,193:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:16:58,195:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-13 17:16:58,195:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-13 17:16:58,200:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:49 UTC. 2024-09-13 17:16:58,200:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:16:58,201:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:16:58,206:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:16:58,206:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:16:58,206:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:16:58,222:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:16:58,223:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:16:58,225:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:16:58,689:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:16:58,690:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:16:59 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_pFv5OXdU_k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 17:16:58,690:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:17:04,986:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8488_key-certbot.pem 2024-09-13 17:17:10,917:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8486_csr-certbot.pem 2024-09-13 17:17:10,918:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:17:10,918:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:17:11,073:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:17:11,073:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:17:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YSt5CA16IqKSdeMKHr2xns1CQZSM_R-ZvAilqPl5qICmFw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:17:11,073:DEBUG:acme.client:Storing nonce: 0Nvv4YSt5CA16IqKSdeMKHr2xns1CQZSM_R-ZvAilqPl5qICmFw 2024-09-13 17:17:11,074:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:17:11,080:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3Q1Q0ExNklxS1NkZU1LSHIyeG5zMUNRWlNNX1ItWnZBaWxxUGw1cUlDbUZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "bDIrpvcr6g8BCCQpazbjJt_utEn-HH29ZrMbLu2TQRoHjironTKpijonVJnQRkWEGk5bkOvsehz1lgoCpbfmZhad2XTGg-iK9sLRGPqmQJsa5dINBEweMu_bFjwAVejTli_Z0QPqKYVMajfwJc_0upyjrqmUuqt5b4bKtgC4GVjNZH5qJkRpwd_YDqqTbx9iqrnX84TPKTsR53zZQ-9KKoizqWNl-P_OdF9miZohPLuPWeOCJv3GnPXhO7Ff69_2ag-_yCTgq62fYrbef76tBsAXDHij54e8GklIplIedH6TxuInwMzUSEk86uHx-UuTr58ATSgU4347qTyKsL-TQA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-13 17:17:11,261:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-09-13 17:17:11,262:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:17:12 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144849776 Replay-Nonce: UAMvsxnwUARThYKs0XQLRnaW-WSODSOJQWHtB6z-v22H4BlmgeY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:56Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144849776" } 2024-09-13 17:17:11,262:DEBUG:acme.client:Storing nonce: UAMvsxnwUARThYKs0XQLRnaW-WSODSOJQWHtB6z-v22H4BlmgeY 2024-09-13 17:17:11,262:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:17:11,268:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndVQVJUaFlLczBYUUxSbmFXLVdTT0RTT0pRV0h0QjZ6LXYyMkg0QmxtZ2VZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2NTk1OTYifQ", "signature": "qK_J7sF0oOwwSYCwuNp0QkjMtglovPMvTV9pJ3xjw9_k0OAYKRwRU9V9D1qqgWO0Nhqz0yGVEHLHuhvV4smfgAslDDQUbMmKaQFUis4ZtK7vWXXn6c38HtBYIZt28nWQxOvFdEA2bwpje9oyWWdprxshhfsVOll7LzNtUCzAYfZ5Etgk51NP04scSZPZrL-oL3qd7YckQGnYyqcs4V0l7KI-ty5FxBpN1bAAudwuJbTRTfPHem7RCAebanqYvuKJ4d5EXshC_UP4GFFmiervL5N1jft-yygrE7mjZ02xmESG3N8WzjcwJKvS6s2452aqRkVjl7nO4_oss0_AoRVJfA", "payload": "" } 2024-09-13 17:17:11,427:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122659596 HTTP/1.1" 200 807 2024-09-13 17:17:11,428:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:17:12 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwCm5_E8u1ITpFNcBnrDTt0DyGV7rHJUz0IPkU-Di8R_Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:56Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/osx5jQ", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/2L4MUQ", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/mCb-BA", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" } ] } 2024-09-13 17:17:11,428:DEBUG:acme.client:Storing nonce: UAMvsxnwCm5_E8u1ITpFNcBnrDTt0DyGV7rHJUz0IPkU-Di8R_Y 2024-09-13 17:17:11,428:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:17:11,429:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-09-13 17:17:11,429:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:17:11,429:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:17:11,430:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:17:11,430:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:17:11,431:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:17:11,431:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:17:11,432:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:17:11,471:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-13 17:17:11,664:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:17:11,666:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-09-13 17:17:11,666:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-09-13 17:17:11,670:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-09-13 17:17:11,674:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:17:11,718:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-13 17:17:11,882:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:17:11,883:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 17:17:11,884:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 17:17:11,889:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:07 UTC. 2024-09-13 17:17:11,889:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:17:11,889:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:17:11,894:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:17:11,894:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:17:11,895:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:17:11,900:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:17:11,901:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:17:11,903:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:17:12,363:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:17:12,364:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:17:13 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "aV2TNvJi0Y0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 17:17:12,364:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:17:19,109:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8489_key-certbot.pem 2024-09-13 17:17:25,005:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8487_csr-certbot.pem 2024-09-13 17:17:25,006:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:17:25,006:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:17:25,160:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:17:25,160:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:17:26 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStpaK6BYmMs_pPUsFgLJX2aoABzX4IraQjYrHe5eoJlUo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:17:25,161:DEBUG:acme.client:Storing nonce: 0Nvv4YStpaK6BYmMs_pPUsFgLJX2aoABzX4IraQjYrHe5eoJlUo 2024-09-13 17:17:25,161:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:17:25,166:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RwYUs2QlltTXNfcFBVc0ZnTEpYMmFvQUJ6WDRJcmFRallySGU1ZW9KbFVvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "I8GirXTR0Jw3OSJhE45Zbe-Y-bAlgRtd4UkTYEE1FiL_pw1wVXNpzbod92YrKqiz4adK_i3btctdjalaMKHVKuhIB5DUK-bpJvtVj-vbA-T1HMDMxwJAVS0-Th3-u_9qA_DHZ_S2ADfmhXPbPAqW0P1xjavi9ICyfaOd0-B30u0tnpLFAltjvGoE8BE9EjlnqJOBhaovr1ETlQp7RTK7pjWU98Ovvc5iFjGordwvI7e_iMydNGEeHQ6WJZUiaY_Z5z924Flmzu1V-AUwOwGsoE-1LRlfEJJMPkMVgLybS46oCuh_ksv19gRCvIDjBNv85fjsFKFI1VeE-GGnxiNfKA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-13 17:17:25,348:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-09-13 17:17:25,349:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:17:26 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144900966 Replay-Nonce: 0Nvv4YSttxSNf7va8XeHrNJ0pcfim3Ok7giJ1MItue6C_lVaKRQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:08Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144900966" } 2024-09-13 17:17:25,349:DEBUG:acme.client:Storing nonce: 0Nvv4YSttxSNf7va8XeHrNJ0pcfim3Ok7giJ1MItue6C_lVaKRQ 2024-09-13 17:17:25,350:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:17:25,356:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3R0eFNOZjd2YThYZUhyTkowcGNmaW0zT2s3Z2lKMU1JdHVlNkNfbFZhS1JRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3MjkwODYifQ", "signature": "NDCfZSsZXVh8goyZlyXYTWxePusanXOD1PUpnzpmQpsrfSH9FUr4K6SfdDaQdZebrSQ3YwVHkC2vtyiLm2gUWHs2ef_kFdsEXHbirtSvLZTh4aH_NGWJ9rw11N9jlUS88Ad_FF7QbkMg7yO3zVvtbBwDAna8sQmm6fmNDZb_-qrMUohP_vSc2Z0pky9kgGSXepbSYufujfeGidYeC4uT9tFmweQvjpG7p8tkv2EhaGeKQpBQLB3mbR0wOGY4zPTzfDuGoIw2ffnzxJhSuVKGeIKOGNSxjgWTLTmpu9hGoui5HFohpW1WSu0CIumDONn_C25bH0Ekn8SqxFMPUAwCpQ", "payload": "" } 2024-09-13 17:17:25,513:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122729086 HTTP/1.1" 200 801 2024-09-13 17:17:25,514:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:17:26 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwEDz431VfC8Rb-qhSNT4e0TBk9-Lbd-PXwqXYeOnR5U0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:08Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/e_W2mQ", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ch6DzQ", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ShHY7A", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" } ] } 2024-09-13 17:17:25,514:DEBUG:acme.client:Storing nonce: UAMvsxnwEDz431VfC8Rb-qhSNT4e0TBk9-Lbd-PXwqXYeOnR5U0 2024-09-13 17:17:25,515:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:17:25,515:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-09-13 17:17:25,515:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:17:25,516:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:17:25,516:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:17:25,517:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:17:25,517:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:17:25,517:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:17:25,518:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:17:25,573:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 17:17:25,744:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:17:25,745:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 17:17:25,747:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 17:17:25,752:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:25 UTC. 2024-09-13 17:17:25,752:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:17:25,752:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:17:25,757:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:17:25,758:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:17:25,758:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:17:25,763:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:17:25,764:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:17:25,766:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:17:26,229:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:17:26,230:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:17:27 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VtrgwY1vi1M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 17:17:26,230:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:17:32,743:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8490_key-certbot.pem 2024-09-13 17:17:38,722:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8488_csr-certbot.pem 2024-09-13 17:17:38,722:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:17:38,722:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:17:38,876:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:17:38,877:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:17:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwf8bE4VN2QXI3z849k7J_wxGs3a83EZRQuT90Hf5rTnQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:17:38,877:DEBUG:acme.client:Storing nonce: UAMvsxnwf8bE4VN2QXI3z849k7J_wxGs3a83EZRQuT90Hf5rTnQ 2024-09-13 17:17:38,878:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:17:38,884:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndmOGJFNFZOMlFYSTN6ODQ5azdKX3d4R3MzYTgzRVpSUXVUOTBIZjVyVG5RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pWyzwzXqWzQBdOvDFsnGCj7RfdRmmHtwnzIGTv1hc8E1mF_swlLnHUMZiTQuuepkbXPY1pXJm8upqez8U3MwbghK46QXQWKsc8RX6sjteKT_8CEGS4e5o8T6twdTEN_8cypKCpDHJ0TUNm7v1DsJ0Csxe9UoyshgHKAtRR63n1l1s1bg_NfGEhVPw_E_Qk6T2ybdad6JnYE93HabNc3eacQ0-U1Mmp0GZUbAXMUiS6HcPlJXQCUbE1FhLf-pyGq2XVkv_jUJQJxEfb5EbxLs3h8U42605KbTnk1e0cJmdLg-vuDTvX0SpxI_9IKcyTRgHr4GPToSo814q-_7XawYPQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-13 17:17:39,066:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-13 17:17:39,066:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:17:40 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144940076 Replay-Nonce: UAMvsxnwyW6zhz4TbFTzXKQj2hRhOLyYk0HIlLgaBUTVDHoburA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:20Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144940076" } 2024-09-13 17:17:39,067:DEBUG:acme.client:Storing nonce: UAMvsxnwyW6zhz4TbFTzXKQj2hRhOLyYk0HIlLgaBUTVDHoburA 2024-09-13 17:17:39,067:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:17:39,073:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bnd5VzZ6aHo0VGJGVHpYS1FqMmhSaE9MeVlrMEhJbExnYUJVVFZESG9idXJBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3OTAxMzYifQ", "signature": "GfJl3hTePR7ksummds532dI6WdGKjpD1TCqjf9gfujA7huIkbVDA2D3ILlk1lQE51ae5geHqLkHveaL5t4hBevfbxwKx0mMLiCvKtgwFb4L5RQWBjlJXLLgYmgfhy80SooZ8cIhvTE5vQQyfLOfr76NXBr1B7l090kU3TnlTGdnsWBGvshBq-s7FS0IrHPRKXiueiv6Aal-TrI6xdwbIxsvIumS3OHH-Wgja8PEuVuN0KfVFFQGoe1YBZkLI47qJaGUiwRWqFGN2zmiwRXuiKo6HD5OyR0DDyUJHsxC-oQRudPPPEBabFvQNFvsjD6ZNyeBO5rhyDMUyli7oX87P8w", "payload": "" } 2024-09-13 17:17:39,232:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122790136 HTTP/1.1" 200 805 2024-09-13 17:17:39,233:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:17:40 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStpZGQKiEvhDRlNl-6ArvhELQL2T35riVP5FrAakeYz-Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:20Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/HbiFxg", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/fCm5hA", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/X2nDCw", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" } ] } 2024-09-13 17:17:39,233:DEBUG:acme.client:Storing nonce: 0Nvv4YStpZGQKiEvhDRlNl-6ArvhELQL2T35riVP5FrAakeYz-Q 2024-09-13 17:17:39,234:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:17:39,234:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-09-13 17:17:39,235:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:17:39,235:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:17:39,236:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:17:39,236:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:17:39,236:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:17:39,237:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:17:39,238:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:17:39,280:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-13 17:17:39,454:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:17:39,456:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-13 17:17:39,457:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-13 17:17:39,462:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:43 UTC. 2024-09-13 17:17:39,462:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:17:39,462:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:17:39,468:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:17:39,468:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:17:39,468:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:17:39,473:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:17:39,474:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:17:39,476:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:17:39,913:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:17:39,913:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:17:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "tS2sbPZBKSQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-09-13 17:17:39,914:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:17:46,001:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8491_key-certbot.pem 2024-09-13 17:17:51,981:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8489_csr-certbot.pem 2024-09-13 17:17:51,981:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:17:51,981:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:17:52,130:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:17:52,131:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:17:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUzS0A46nVKRAu8zQKGf4K0untifczFr1rVio5yFJTk9I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:17:52,131:DEBUG:acme.client:Storing nonce: 4OmWUlyUzS0A46nVKRAu8zQKGf4K0untifczFr1rVio5yFJTk9I 2024-09-13 17:17:52,131:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:17:52,137:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVV6UzBBNDZuVktSQXU4elFLR2Y0SzB1bnRpZmN6RnIxclZpbzV5RkpUazlJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "agX4ilIxH2OjNGUbtlf-5hEPJcNEPbWUErOK9welJjGcjBTI5EUQTDDedEhMPb_JQ4ttqYPtkLUYiZqTA3yUVDSH1ygv-QofkJ3Zs3cl9utw9soPBQ6kXu3RtnXYZnbid_d0fD3uqPu4XM92U_E5td2NnAoYDqJUeB_mUKg_gCsYyiWSuvvlykpl8K0DE69OwExArjNYN_tYo1fw7aecSxQlKIvrm-esSsIuXR3fNSsvGgWvnjpdKHHcrPdsEqmGX-56HPkBCf3L38oyNAaDiYu_LuKBXhdDvsyQ_iqelONlaHf_DY-sDNKYMGRr7wlkkDvtB-7U6_KLdW4HOHWmsA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-13 17:17:52,395:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-09-13 17:17:52,396:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:17:53 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144979426 Replay-Nonce: 4OmWUlyU_WM-kOsRU2ZxbE2YoLCcmoMolv4rczjgHiCp1dnZOx4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:33Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144979426" } 2024-09-13 17:17:52,396:DEBUG:acme.client:Storing nonce: 4OmWUlyU_WM-kOsRU2ZxbE2YoLCcmoMolv4rczjgHiCp1dnZOx4 2024-09-13 17:17:52,396:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:17:52,402:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVfV00ta09zUlUyWnhiRTJZb0xDY21vTW9sdjRyY3pqZ0hpQ3AxZG5aT3g0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI4NTExMzYifQ", "signature": "SY_B-vCbnQi4-J8gwVMyoprUTKg1bVaDbuvc8ORh9jJO1NLWAATNUrg6xoQnl7PGoKiVrxa7AWxLfcn-gpsS9D9619WHXuGcCLRZQynlifiNBPGiGlX0uG84cjDtcQPm66efcK1wK02DfM5C4O2lYCkqZW3HS5Aao2J4JnR1swQUNPNutOy796c3nyvQ5NRv0kaaWiatAsl3dsvsjezuPY_Ryfwx3LUoGuZwwZahZq9SwLgrLVwH_GhS2ZVfBBJkleDLm8SRq8iuNepqS57wZVtivS1u7AiZb6hDM1v7-uBZnAo2qCm3R5cIVeWmHGrJ-aB6rxnhmhU4yK69akqRwA", "payload": "" } 2024-09-13 17:17:52,566:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122851136 HTTP/1.1" 200 809 2024-09-13 17:17:52,567:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:17:53 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQpZapT80eFS_PDrFK9nDAR5tdIIOCqgfk-Dq7dOE4YUE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:33Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/Kdwo9g", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/kuyLHA", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/nTAn0w", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" } ] } 2024-09-13 17:17:52,567:DEBUG:acme.client:Storing nonce: fCBw7MtQpZapT80eFS_PDrFK9nDAR5tdIIOCqgfk-Dq7dOE4YUE 2024-09-13 17:17:52,568:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:17:52,568:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-09-13 17:17:52,569:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:17:52,569:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:17:52,570:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:17:52,570:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:17:52,570:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:17:52,571:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:17:52,572:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:17:52,622:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-13 17:17:52,820:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:17:52,820:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-09-13 17:17:52,821:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-09-13 17:17:52,825:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:14 UTC. 2024-09-13 17:17:52,825:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:17:52,827:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:17:52,832:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:17:52,832:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:17:52,832:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:17:52,848:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:17:52,849:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:17:52,851:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:17:53,277:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:17:53,277:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:17:54 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "m28I3wav1Io": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 17:17:53,278:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:17:59,850:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8492_key-certbot.pem 2024-09-13 17:18:05,850:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8490_csr-certbot.pem 2024-09-13 17:18:05,851:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:18:05,851:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:18:05,994:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:18:05,995:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:18:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQquvADZmDNdFr04t2EvIKej1iLVopOnbmzZcrk0b8ZpM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:18:05,995:DEBUG:acme.client:Storing nonce: fCBw7MtQquvADZmDNdFr04t2EvIKej1iLVopOnbmzZcrk0b8ZpM 2024-09-13 17:18:05,995:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:18:06,000:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFxdXZBRFptRE5kRnIwNHQyRXZJS2VqMWlMVm9wT25ibXpaY3JrMGI4WnBNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "bEK5-8deGRPMR2ZmGuoJzm9GhQym2MFqY0HwKxiYolyCijJlXsGip1dnBIrRzVwoLp5ivariCM601sp7OCYMh07fBKQTZnNCEmk7h6EQjcJsjNDY-ouZzh0rUs-QCRAapPDqY43_x4GX3Jx0w6qTyNVrMMUl4lVTOoT138_Ns3nqpH4Y8nvoj1BzR9_qYf5ANtF1gm0vCFmLuGEzXoeeN8TCZNaZK7AbQtmsn9cNkfvTJfuvfO1wWYrDLx5JP0kD-EY5_A33aFdzHuBH7AA136VAZ3h1yVRtnJo3b9Aq61oU1bbnmV7fecZcBS_mOYKWPaQnjV-DiEgnEhx2bcKPgw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-13 17:18:06,173:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-09-13 17:18:06,173:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:18:07 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145018096 Replay-Nonce: fCBw7MtQS1wTzNdO-XKO373fTDAl7LfiAWMwcAgwhiciKtvOWt4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:45Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145018096" } 2024-09-13 17:18:06,173:DEBUG:acme.client:Storing nonce: fCBw7MtQS1wTzNdO-XKO373fTDAl7LfiAWMwcAgwhiciKtvOWt4 2024-09-13 17:18:06,173:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:18:06,179:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFTMXdUek5kTy1YS08zNzNmVERBbDdMZmlBV013Y0Fnd2hpY2lLdHZPV3Q0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5MTA5OTYifQ", "signature": "Z5ixct13H6AaiFKuO5s98ZvQMFX-BhabTfVKGQhCqFdnVXzaj50le3lqRphDHAau9DOOz3hf4HykXYSG6m8ar2RYz7pB8cOYp2NeZSfEG2mttqXIz9SOsp6-I12p7suI1JMNrtpLVrQ7IRMMpBE02F5ric1pKjDekT9c8KvjvUC3bVHSE99Uzd_BlzgoXS3cG8dyOAi6KHXZzYsL7r-FDaIXsQsYkB6Dk4SQTn-PacQKirs_BmAGatfaNuz2OTp8F_e3BUIE5rl7GHp1y9MARtkq-K2REYaymi45nrmafX3PKCukJf_xk_edsMd6oYOAbu4kKczZViTngBBDg2Pb_Q", "payload": "" } 2024-09-13 17:18:06,328:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122910996 HTTP/1.1" 200 807 2024-09-13 17:18:06,329:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:18:07 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQut_lyYPmhjaUvMUG6Movj67ucY0fAUy3vT8AHv6-mYo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:45Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/Xg0Zog", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/4_hHkg", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/QNmv8g", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" } ] } 2024-09-13 17:18:06,329:DEBUG:acme.client:Storing nonce: fCBw7MtQut_lyYPmhjaUvMUG6Movj67ucY0fAUy3vT8AHv6-mYo 2024-09-13 17:18:06,330:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:18:06,330:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-09-13 17:18:06,331:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:18:06,331:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:18:06,332:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:18:06,332:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:18:06,332:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:18:06,333:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:18:06,334:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:18:06,385:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-13 17:18:06,590:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:18:06,591:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 17:18:06,592:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 17:18:06,597:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:33 UTC. 2024-09-13 17:18:06,598:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:18:06,598:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:18:06,603:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:18:06,603:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:18:06,604:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:18:06,612:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:18:06,613:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:18:06,615:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:18:07,084:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:18:07,085:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:18:08 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CijnP5bSwXs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 17:18:07,085:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:18:13,594:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8493_key-certbot.pem 2024-09-13 17:18:19,673:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8491_csr-certbot.pem 2024-09-13 17:18:19,673:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:18:19,673:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:18:19,828:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:18:19,829:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:18:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStt21EBrwGhKSWzovly3KoyflVybDr-m1Loilb-JRbnJ4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:18:19,829:DEBUG:acme.client:Storing nonce: 0Nvv4YStt21EBrwGhKSWzovly3KoyflVybDr-m1Loilb-JRbnJ4 2024-09-13 17:18:19,829:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:18:19,835:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3R0MjFFQnJ3R2hLU1d6b3ZseTNLb3lmbFZ5YkRyLW0xTG9pbGItSlJibko0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "skaU9CNUDljwyOw3kA7un-65nfegdcexO4WOUOrT238sLINE5AmsifKyZDtJhHSWVd7QO51QY4OqKWImm84dKSR8QxBSTJerd_sStJKODqW6AJrvptHzskEb8bHjncr0mDgpDAVOKx3TLYTotIo7iVoSrY8KWr4xQyv4uOZr41zkNZOCN-x635xjPxJ-mUWgmYKAYy8L9B7bQzeBjjBpMrR-c1qWuGZVz4jOO2ezi3kld7J1YjPiOZpzZbVkzMRpJv74_kbcBKhTenq1Kvr5QB4LHru7ECbWDpzikWJqokIDMeKYZS3OTN-O9SrwVZmtV4l9_xUX2Gx9UN5TzgBcHg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-13 17:18:20,039:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-09-13 17:18:20,040:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:18:21 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145056036 Replay-Nonce: 0Nvv4YStL9IWmRli7gmz1yWG9snUqruqHe-XRVSclBqNsTqHhxc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:58Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145056036" } 2024-09-13 17:18:20,040:DEBUG:acme.client:Storing nonce: 0Nvv4YStL9IWmRli7gmz1yWG9snUqruqHe-XRVSclBqNsTqHhxc 2024-09-13 17:18:20,040:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:18:20,045:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RMOUlXbVJsaTdnbXoxeVdHOXNuVXFydXFIZS1YUlZTY2xCcU5zVHFIaHhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5NjY5OTYifQ", "signature": "yZoGUFYUbk5Mo7mVcmvwD_wrhQG5Mt_SCcmWdOyDRiJESLgTxhkn6TbtRt_cIZnT89gLwiu7hnjqZZpGp3JtiN3M-74qm9U9eqHa6H90hjCB5zWAvFLBkHksSrt4QYRWzvC0wWk63QpS3E1xnVU44pZgZmG1pBXsOkQ6WD8OlGeQuQigpNKPoH_8eBMWezz0W3Q8XRkiB5q_W2QE9bSaWvj6NHtA8-iYzw3XdzzPBG4HNa1n18lTsGzjlF3tYXpZAyylEZemZ9TS_F8mJULEyGgXAL4r7cL611t-f1ndWA5LU65pFWB9SZ4FxdI6WowTfq5nK-_IRTsvOJd6Lv8dFA", "payload": "" } 2024-09-13 17:18:20,205:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122966996 HTTP/1.1" 200 806 2024-09-13 17:18:20,205:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:18:21 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStiVfoCAAj37BxOGjZGlevJmHdjDdt8hsZCbOadirn2u4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:58Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/9cCtaA", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/lsTunA", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/RuQu8g", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" } ] } 2024-09-13 17:18:20,206:DEBUG:acme.client:Storing nonce: 0Nvv4YStiVfoCAAj37BxOGjZGlevJmHdjDdt8hsZCbOadirn2u4 2024-09-13 17:18:20,206:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:18:20,206:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-09-13 17:18:20,207:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:18:20,207:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:18:20,208:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:18:20,208:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:18:20,208:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:18:20,209:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:18:20,210:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:18:20,260:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-09-13 17:18:20,260:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:18:20,261:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-09-13 17:18:20,269:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-09-13 17:18:20,271:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-09-13 17:18:20,272:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-09-13 17:18:20,272:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-09-13 17:18:20,272:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-09-13 17:18:20,274:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-09-13 17:18:20,318:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 17:18:20,553:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:18:20,554:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 17:18:20,555:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 17:18:20,561:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:53 UTC. 2024-09-13 17:18:20,561:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:18:20,561:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:18:20,566:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:18:20,567:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:18:20,567:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:18:20,582:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:18:20,583:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:18:20,585:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:18:21,012:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:18:21,013:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:18:22 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "EXwvzZCqBgc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 17:18:21,014:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:18:27,274:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8494_key-certbot.pem 2024-09-13 17:18:33,345:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8492_csr-certbot.pem 2024-09-13 17:18:33,345:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:18:33,346:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:18:33,488:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:18:33,489:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:18:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQhMz8OIsQMRdBkdPzWtAj1EGYmJrIrLiLDU2ljIC7Wwc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:18:33,489:DEBUG:acme.client:Storing nonce: fCBw7MtQhMz8OIsQMRdBkdPzWtAj1EGYmJrIrLiLDU2ljIC7Wwc 2024-09-13 17:18:33,490:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:18:33,496:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFoTXo4T0lzUU1SZEJrZFB6V3RBajFFR1ltSnJJckxpTERVMmxqSUM3V3djIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PvWYkewTuclJI_3egNmswIzMytCkdxo4xz3HadPqzjJaCPywFwoJ-9NjuJrvEe1AxVM3cM-sGugSboi71nLWwcfQUJ-5xyF4QrZPZ6j1lRJTN2sBU_rpoNbjoO3VjNnr7Eu_nthZuVJ8FbdTUq_Bc0r62-WQP2X4XuZy_t305yhTyVLLkW_uCJbrfWJCWkUNtfPJTF6n0tSBDk32Q4dnrATfZqs2ugTLbHmCa3u_9mIPSA8xM5jpAUvp_MrJHoJk4JHkv3XFID-TUqo0VNfCR6oJ0w56g1qTl0TzkttixvkimQuAwwnYYjhCmyUkoUu3-gIeCXKrsFI2UI88XdD_YQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-13 17:18:33,692:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-09-13 17:18:33,693:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:18:34 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145110166 Replay-Nonce: 4OmWUlyUjgDQxkla6UHmY0hAMifTcK9JnSOvrrsjOsS54VEhXw4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:11Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145110166" } 2024-09-13 17:18:33,693:DEBUG:acme.client:Storing nonce: 4OmWUlyUjgDQxkla6UHmY0hAMifTcK9JnSOvrrsjOsS54VEhXw4 2024-09-13 17:18:33,693:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:18:33,699:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVqZ0RReGtsYTZVSG1ZMGhBTWlmVGNLOUpuU092cnJzak9zUzU0VkVoWHc0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMwNDM0ODYifQ", "signature": "m3gPBcKoL9z9jaB7jZdjyuZJK6jgB0fL6S7dSaOeKYPukG0YQ4zydiU2Nx5CEPHU0tc2o2JdIo3jGmKRTQE5BkuoWYxW18GXkH7Z3eVX4U7iLgl78-XXaBadqzWAJcattk67LjdScTmma1T008l92EsOedVj2iILrj_mY_iCGsZijMW33DvnoQphumjcLm4c7LtD5UNlGMi5R0a1ywVTm3d7D74zgG7Haa9_r3T0uW8KJRkfeB7zar2_-4mqJRpr1Ifg7eYc0idhyIBqXh8rFOmDJuNMrAoThm9SCzuPG5r0DrfNSWrcnr8ayo3epPyG-oLcr-WCiG4UOrSZoC3iRA", "payload": "" } 2024-09-13 17:18:33,850:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123043486 HTTP/1.1" 200 811 2024-09-13 17:18:33,850:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:18:35 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUHqYHLgvitxEkyyMh24uZAWpSZ9i4hzXIcl9XeIka5Jk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:11Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/oHWByA", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/5SnKCA", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/6UDG0g", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" } ] } 2024-09-13 17:18:33,850:DEBUG:acme.client:Storing nonce: 4OmWUlyUHqYHLgvitxEkyyMh24uZAWpSZ9i4hzXIcl9XeIka5Jk 2024-09-13 17:18:33,851:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:18:33,851:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-09-13 17:18:33,852:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:18:33,852:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:18:33,853:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:18:33,853:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:18:33,853:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:18:33,854:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:18:33,855:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:18:33,909:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-13 17:18:34,140:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:18:34,141:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 17:18:34,141:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 17:18:34,145:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:20 UTC. 2024-09-13 17:18:34,145:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:18:34,147:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:18:34,152:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:18:34,153:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:18:34,153:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:18:34,168:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:18:34,169:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:18:34,171:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:18:34,646:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:18:34,647:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:18:35 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "OhaPI6BYjRs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 17:18:34,647:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:18:41,299:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8495_key-certbot.pem 2024-09-13 17:18:47,471:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8493_csr-certbot.pem 2024-09-13 17:18:47,471:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:18:47,472:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:18:47,628:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:18:47,629:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:18:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnw-1kWc_PMvfyFNid2Au9y4xrx5DIna8WOf2MLFWagHVo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:18:47,629:DEBUG:acme.client:Storing nonce: UAMvsxnw-1kWc_PMvfyFNid2Au9y4xrx5DIna8WOf2MLFWagHVo 2024-09-13 17:18:47,629:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:18:47,636:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bnctMWtXY19QTXZmeUZOaWQyQXU5eTR4cng1REluYThXT2YyTUxGV2FnSFZvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "GQM3xxnOSZKvvgh_JebZb0VbVCiXHqifbUErDhJC2f5MaXYOoSaUWK-1qHFtIojXfIWKK6dqb7K5sg7isNRffkSnnsT0jpniqIEi_EA2WGMZ0gCLCwb6uTboVV-aJgM2untNj-1a8XrPUoaAMYo50umbXovG89CK8mTYCdepW86CwfGK2aNY_dq8POFpiIVtxOXGQmvZIE7eDQ8gX3HYSgGAUEPGYhjWHY32PZl9w_H_7gJoNI7IPExFEowHovDNDh5-cayRVxP76tldDuMeMzboOlY1Dr_pB_-QHcBShXmF92NR1JYfQjrs3IJg-VOC9ZkLQ81jeztGVW5neR3Jcg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-13 17:18:47,821:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-09-13 17:18:47,821:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:18:49 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145156016 Replay-Nonce: 0Nvv4YSthL2JI9K66Gzq_ffw276YKQ8hAhP195kb11jiRSD3W4E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:24Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145156016" } 2024-09-13 17:18:47,822:DEBUG:acme.client:Storing nonce: 0Nvv4YSthL2JI9K66Gzq_ffw276YKQ8hAhP195kb11jiRSD3W4E 2024-09-13 17:18:47,822:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:18:47,827:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RoTDJKSTlLNjZHenFfZmZ3Mjc2WUtROGhBaFAxOTVrYjExamlSU0QzVzRFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxMTQzNjYifQ", "signature": "Ri7cRT04ZZYxKraaunFh6n3SlhfXBi0pPYr7xhhn5MxA4fAbGz9xTROrBeLkLMmnPl7_hsLYCBhJR9Myeiftt13QndAhzjyT4_1zcj-VbW0YMIcl97KtiZnOlMssewoldSkuDY7qXK9dG4sLFQkfU7OxIB1S41kTxuTYl0PYrafsWFxC8iZnut4DBUo4NfWMnEdHGsNIp73vag7mdmCzzy-L8hDkBrDSaAVLl8kuGr5fjdPAfrEWrZ8PkIGAOAxSR_bmo5q8d6aATCNypX7BrVQY7ov_d0IE1CiQXlUV2FOvvfNcuZkMA-L-zzSsQoJBhLTRLBS8hPpF30EGafjvZA", "payload": "" } 2024-09-13 17:18:47,989:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123114366 HTTP/1.1" 200 810 2024-09-13 17:18:47,990:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:18:49 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStaQGF4PoIWi1wlbNrHPZrZ-4XvCDk-U53E-4_Xs84mt8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:24Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/K6FLfA", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/hpZofw", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/0k48SQ", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" } ] } 2024-09-13 17:18:47,990:DEBUG:acme.client:Storing nonce: 0Nvv4YStaQGF4PoIWi1wlbNrHPZrZ-4XvCDk-U53E-4_Xs84mt8 2024-09-13 17:18:47,991:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:18:47,991:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-09-13 17:18:47,992:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:18:47,992:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:18:47,993:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:18:47,993:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:18:47,993:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:18:47,994:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:18:47,995:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:18:48,047:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 17:18:48,276:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:18:48,277:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-09-13 17:18:48,278:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-09-13 17:18:48,282:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:39 UTC. 2024-09-13 17:18:48,282:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:18:48,283:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:18:48,288:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:18:48,289:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:18:48,289:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:18:48,294:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:18:48,295:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:18:48,297:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:18:48,769:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:18:48,769:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:18:49 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "sc0FtP9NoS0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-09-13 17:18:48,770:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:18:55,553:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8496_key-certbot.pem 2024-09-13 17:19:01,548:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8494_csr-certbot.pem 2024-09-13 17:19:01,548:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:19:01,548:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:19:01,705:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:19:01,707:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:19:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStm8uz769QFZy8uFaZ9eUU2ofUFw30tiY8FxBXzQoPSNw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:19:01,707:DEBUG:acme.client:Storing nonce: 0Nvv4YStm8uz769QFZy8uFaZ9eUU2ofUFw30tiY8FxBXzQoPSNw 2024-09-13 17:19:01,707:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:19:01,715:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RtOHV6NzY5UUZaeTh1RmFaOWVVVTJvZlVGdzMwdGlZOEZ4Qlh6UW9QU053IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vdd92B5SmFrTgITLWxRsPvd3yObwxmBz7uSjWCIvieaRRaEaj8IiwFZUtGb9fWbXeUeUghGguuooTFkhlsFgmHpWiFpxqZ_YeQnrkQGOjcMlwcv3aDxR1_eohjk_P_0xuN6YCJm3AY5FwnfQkQCg1TS0reM4Ty3Gf-aWLDqze8tT-J4tWyuJHQ9RdcyzBtUmkGy_xCMna8VRzfNZ20tappCA4EUqkviddakhbGDBUJtEQT_SNtxxK0KoUvOA5sZr1-Kg35G3Wpp1IrIXtnJA5YhCNf1Y4s7pjGwz_Lbv7psAVXJaxg_q11G0B6_kCCs1CyhLg9Qi7CgxVZy4QUEySA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-13 17:19:01,898:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-09-13 17:19:01,899:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:19:03 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145193816 Replay-Nonce: 0Nvv4YSt4rFxR1nzPc9iAj6tn1yqjCEVQoJ-SV5R9b2UsmBf73E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:37Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145193816" } 2024-09-13 17:19:01,899:DEBUG:acme.client:Storing nonce: 0Nvv4YSt4rFxR1nzPc9iAj6tn1yqjCEVQoJ-SV5R9b2UsmBf73E 2024-09-13 17:19:01,899:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:19:01,906:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3Q0ckZ4UjFuelBjOWlBajZ0bjF5cWpDRVZRb0otU1Y1UjliMlVzbUJmNzNFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxNzMyODYifQ", "signature": "mU_G9a90lEvDImTEKzlU7bR-deb5OZPlJaqERgQMlh3RbRWp3Q8HlGMjLPrHWHirXov6OXmalklqp-KQZKhd7ml_jU-Khy_DF8_WSvTVpj8jyZyHosDlXQ49dyCR_lnzxOu8C2C61DduFlwvvR7oJ_Ve7DV1-5Qj2mi7JfOiZloF6-kl5RFRNSDCl_Q2MMMLvhIalgXLw_WT-exKPFU5heiwd-ZKGC-JyN0dqmZ4ma56jAc4Kxxl3M_n79E7UnN6GyCqQEIsrGCfG-AhfXn1W-KigJnS3AwGRAIDZBMQH7_3jELx0jUhIDixLyYtOY0pnD3WACje2lDEgRJoNENFYA", "payload": "" } 2024-09-13 17:19:02,067:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123173286 HTTP/1.1" 200 809 2024-09-13 17:19:02,068:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:19:03 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStJol2OOYspF_lRNH-B_mSgYAlgf-V5Ov0iYj5gxppgLE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:37Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/xZ9qpw", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/QeJIqg", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/S6yiLg", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" } ] } 2024-09-13 17:19:02,068:DEBUG:acme.client:Storing nonce: 0Nvv4YStJol2OOYspF_lRNH-B_mSgYAlgf-V5Ov0iYj5gxppgLE 2024-09-13 17:19:02,068:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:19:02,069:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-09-13 17:19:02,069:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:19:02,070:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:19:02,070:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:19:02,070:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:19:02,071:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:19:02,071:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:19:02,072:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:19:02,122:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 17:19:02,314:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:19:02,316:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-09-13 17:19:02,316:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-09-13 17:19:02,321:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:57 UTC. 2024-09-13 17:19:02,321:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:19:02,321:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:19:02,327:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:19:02,327:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:19:02,327:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:19:02,343:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:19:02,344:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:19:02,346:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:19:02,771:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:19:02,772:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:19:03 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "b30fKbWIC6M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 17:19:02,773:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:19:09,168:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8497_key-certbot.pem 2024-09-13 17:19:15,228:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8495_csr-certbot.pem 2024-09-13 17:19:15,229:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:19:15,229:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:19:15,373:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:19:15,374:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:19:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQQ9c7sV2SbO06FT0OUwAB6414N9d7fMzYRdD8J5dKPCw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:19:15,374:DEBUG:acme.client:Storing nonce: fCBw7MtQQ9c7sV2SbO06FT0OUwAB6414N9d7fMzYRdD8J5dKPCw 2024-09-13 17:19:15,374:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:19:15,380:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFROWM3c1YyU2JPMDZGVDBPVXdBQjY0MTROOWQ3Zk16WVJkRDhKNWRLUEN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EXej02IysrSBA6tcHyGdK8g_lJyuXEwuFmpUwAfPAeMmW2TtEU0VBzQuzw0BrzvRXoRdBaoTaLmE9F7D3N0LtIkUzYYuy-911PyCkc4JcuFDlpIV1KitrRDU0Uk1UXVjZM6zmLa0uu_0E-7igIbYmZErEWcKqGnb6POLAfLXfQH3RJQbdGWhcGmiGbkzcVMmWtZv8R38YF2KDnq_I1AN3IAapJsmPAi699xlaTHULAda3jQoGo3csuSpacAFuf8XQ34bcDgOBG87z9kgOCp3q6Q9gjfKPM3iebqloss0fa1E8cdzszSXPMSTJs0_OGs9pxRD96LRHjgrqtIXbgF2bQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-13 17:19:15,575:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-13 17:19:15,575:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:19:16 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145229456 Replay-Nonce: 4OmWUlyUouKgs-vO_d7x0xjqfecqKe952dFK4oluiexXy5-ZRbU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:49Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145229456" } 2024-09-13 17:19:15,575:DEBUG:acme.client:Storing nonce: 4OmWUlyUouKgs-vO_d7x0xjqfecqKe952dFK4oluiexXy5-ZRbU 2024-09-13 17:19:15,577:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:19:15,583:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVvdUtncy12T19kN3gweGpxZmVjcUtlOTUyZEZLNG9sdWlleFh5NS1aUmJVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyMjk1MDYifQ", "signature": "wBqr7e2j5oa6L1ELXhJ5gpxSx7XOpuR02-k9TwqDiEy_bCez12UPULWD0jFpeIRZF4Rz0prU4R90labCTfuZ2SozBiMacrCcChmDt6v4EdtuPWG3NuSPQVqSs0afD6wccU5oguuJWS7A4RazSCtb3x8LZnOtPDddT9o6k44MJEAf2mnhgorHoPU4-hnh2nbOcSqWCzooxI8DZ-z2R2DQMlkCexSNaaugMipEs1QABBojBYKDHlnSW2OkYQA7gEBxTmMZX7v5uSpH4m_hf6521VQ3t1HHo06cfL22v0oqIoUuf1oWm7OIMRubjqrUBDFhpwXdLVid0A-imiaoSDurPg", "payload": "" } 2024-09-13 17:19:15,757:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123229506 HTTP/1.1" 200 805 2024-09-13 17:19:15,757:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:19:16 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQfF1zZMHBpKKo-zujQGb21oOG8GwgYBKYgSCwZfoKpIY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:49Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/yzBBsQ", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/gbt7DA", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/K5UDEQ", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" } ] } 2024-09-13 17:19:15,758:DEBUG:acme.client:Storing nonce: fCBw7MtQfF1zZMHBpKKo-zujQGb21oOG8GwgYBKYgSCwZfoKpIY 2024-09-13 17:19:15,758:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:19:15,758:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-09-13 17:19:15,759:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:19:15,759:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:19:15,760:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:19:15,760:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:19:15,761:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:19:15,761:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:19:15,762:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:19:15,806:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 17:19:15,995:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:19:15,997:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 17:19:15,997:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 17:19:16,003:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:15 UTC. 2024-09-13 17:19:16,003:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:19:16,003:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:19:16,008:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:19:16,008:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:19:16,009:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:19:16,024:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:19:16,025:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:19:16,028:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:19:16,491:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:19:16,491:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:19:17 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HwjtyUSa9u4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 17:19:16,492:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:19:22,916:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8498_key-certbot.pem 2024-09-13 17:19:29,029:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8496_csr-certbot.pem 2024-09-13 17:19:29,030:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:19:29,030:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:19:29,183:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:19:29,184:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:19:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwK-f6sVaV5PEcJdbvS2nZwH0nQhlkK0m3vErQ-XY0Oog X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:19:29,184:DEBUG:acme.client:Storing nonce: UAMvsxnwK-f6sVaV5PEcJdbvS2nZwH0nQhlkK0m3vErQ-XY0Oog 2024-09-13 17:19:29,184:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:19:29,190:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndLLWY2c1ZhVjVQRWNKZGJ2UzJuWndIMG5RaGxrSzBtM3ZFclEtWFkwT29nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Vx-x1Mx3jj3PnZHV9WEC7AjRVVd9HCkWxGraOrKiFsA3Db7LGwCasN0Ov2e1bd2K9sNFmcfckL8kNVCPLOwquBh0Rsmf_ctov12vSbvEMswBSHlrUbAPVdEgU38MM9g3BMd0KUWGJ80VEfUWWpOOcqekKHsaggW2jXBXciRQB7psdJYBFJv-FNDDRG7YY3kUSWRYCNaU31QPPsLrrpEpQ8xMp7UTIkMZ5vdZ8HUoGOEUFXws9zFHyxcCRWblNnu5tGTbCrPvopbE59zMLY9TXcQi1hGSDaieJ2cYwzsGEf1BgsR26IytZRWLsgru2E4x1MRJSG4Wzz8C_hzPQsh4Xg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-13 17:19:29,369:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-13 17:19:29,369:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:19:30 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145265276 Replay-Nonce: 0Nvv4YStMCyxRt30ofZo5MgV7gR7RTyIVbantrCSeJRFC1b7XJg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:57:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145265276" } 2024-09-13 17:19:29,370:DEBUG:acme.client:Storing nonce: 0Nvv4YStMCyxRt30ofZo5MgV7gR7RTyIVbantrCSeJRFC1b7XJg 2024-09-13 17:19:29,370:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:19:29,376:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RNQ3l4UnQzMG9mWm81TWdWN2dSN1JUeUlWYmFudHJDU2VKUkZDMWI3WEpnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyODY1ODYifQ", "signature": "UgvRAFUOuaxPBcCM6fHyvmdXerHFCD5clHrqVKy0ACVwPe9DyJEzDgpURITHFtyAQ08Jj7QRNBAlifWOPPCGqehMQGWjzmdM9inbI1LZ4ZSpG6UfJ0UDZ8pLdObRc6zdTLbUjuGZ-7sPh4Rr49N1KZLpJXes2IIyRc6PpI53sXgyfK9Ztxzk_GDRuePmfn9BidBh8zV1La6XRg8eudq6I3iOQG1cRUSY3W5JsE_xZz0MOHGKGobM2ycPXkC2tkxKOPmwVZcdhwOqbMB8oLFm4Cks6UpVTFpe-6apMQJAGJLjSQvC9i8hk6dWjvVw7vxo-6EA7JcGA6iQ5abWAlqzoQ", "payload": "" } 2024-09-13 17:19:29,532:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123286586 HTTP/1.1" 200 805 2024-09-13 17:19:29,533:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:19:30 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStQklTNfkNwBI1S1bN4saBYfpJLEfaXliL_Sk1saVoAkM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:57:01Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/B20YQg", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/dinKKw", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/S9gNtg", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" } ] } 2024-09-13 17:19:29,533:DEBUG:acme.client:Storing nonce: 0Nvv4YStQklTNfkNwBI1S1bN4saBYfpJLEfaXliL_Sk1saVoAkM 2024-09-13 17:19:29,533:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:19:29,534:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-09-13 17:19:29,534:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:19:29,535:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:19:29,535:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:19:29,536:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:19:29,536:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:19:29,536:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:19:29,537:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:19:29,589:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 17:19:29,837:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 17:19:29,838:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-13 17:19:29,839:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-13 17:19:29,843:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:30 UTC. 2024-09-13 17:19:29,844:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 17:19:29,844:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 17:19:29,849:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 17:19:29,850:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 17:19:29,850:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 17:19:29,855:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 17:19:29,856:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 17:19:29,858:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 17:19:30,299:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 17:19:30,300:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:19:31 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3Lts2waekzU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 17:19:30,301:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 17:19:36,627:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8499_key-certbot.pem 2024-09-13 17:19:42,649:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8497_csr-certbot.pem 2024-09-13 17:19:42,649:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 17:19:42,649:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 17:19:42,796:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 17:19:42,796:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:19:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQMHdCAbeQSUag7n4MzDCfQgv-8fqwGvmpwZ8UzcwwV6w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 17:19:42,797:DEBUG:acme.client:Storing nonce: fCBw7MtQMHdCAbeQSUag7n4MzDCfQgv-8fqwGvmpwZ8UzcwwV6w 2024-09-13 17:19:42,797:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 17:19:42,804:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFNSGRDQWJlUVNVYWc3bjRNekRDZlFndi04ZnF3R3ZtcHdaOFV6Y3d3VjZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OKHMl7zAzEgVmJji922blaDnBt8R0EAX3ReGVwEkTJnKdV95fBnakGKOy3yNdNrHvLy9j07KgLOjElIj1B2z5weg9PbBMpDXqUC4-eLnCTf6ISBozAuLJdzbX0dlQRq4s5pdasIL4j-noGedJ9aYKLAJDkO86Q3PkTTdajLuc1iZqpLxe9Ob-F-gq5ZYCDohQTIh2KLlsNIsy2xtOGi_sV5P7m_9L87tMu2D6-H3CcYYb3rTgS_egJONmt4O4eXOfHAXXWQ_WhMXIk1pPU4WxzwhEi8I1p9P5kjD_C7gLzFJ_SfI-U5Hsy6qXI8m46iWovhO-H7RtlR3QaA-20BvEg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-13 17:19:43,006:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-13 17:19:43,007:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 15:19:44 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145319296 Replay-Nonce: 4OmWUlyU0rV-QwPZd1h2sPeevSYIz84F129CO0YrIjnR4w0iz3k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:57:14Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145319296" } 2024-09-13 17:19:43,007:DEBUG:acme.client:Storing nonce: 4OmWUlyU0rV-QwPZd1h2sPeevSYIz84F129CO0YrIjnR4w0iz3k 2024-09-13 17:19:43,008:DEBUG:acme.client:JWS payload: b'' 2024-09-13 17:19:43,014:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVUwclYtUXdQWmQxaDJzUGVldlNZSXo4NEYxMjlDTzBZcklqblI0dzBpejNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMzNjQ2MDYifQ", "signature": "yIpSj9B3pNY35QJSz6C6NeIhZbhWKovJems84q7wHp6GtMnC0afKkzI0W-yQIBxo3Uo4NfsLWSa6jrPqv0gNSTT6gp3cNfD3-aOxwCHknSYu4aGgna8_lv6sZ6XaVU9f8IUnTYYDAvuXv95UJc_5lnJtOJqaQuyCplCob_9VKXDkFz1CTX4G4TXZBb9i4e0U0d1dt8aTN4B6qM4vYgN6H1joKK2y_Sz3fNfh4rc-b8DB4qIKHr9aPQlWcZ7EMAfkw_MwXdDP7KNcnqEicVcc8l-QBGorRUoWtGJXv3VDxjaTurFP7pMTB3w7zIGl2-E4d23L9CrAxEHcokjhOsEzOQ", "payload": "" } 2024-09-13 17:19:43,180:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123364606 HTTP/1.1" 200 805 2024-09-13 17:19:43,180:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 15:19:44 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyU_r5fSeopsVFCHuzrxiGRU-vpevRLsZi_AZPAoS2xc-g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:57:14Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/LOiTWA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/DMnfUA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/ndw7tA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" } ] } 2024-09-13 17:19:43,181:DEBUG:acme.client:Storing nonce: 4OmWUlyU_r5fSeopsVFCHuzrxiGRU-vpevRLsZi_AZPAoS2xc-g 2024-09-13 17:19:43,181:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 17:19:43,182:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-09-13 17:19:43,182:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 17:19:43,182:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 17:19:43,183:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:19:43,183:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 17:19:43,183:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 17:19:43,184:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 17:19:43,185:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 17:19:43,185:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-09-13 17:19:43,185:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-09-13 17:19:43,197:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-09-13 17:19:43,198:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)