2024-09-13 02:40:25,512:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-09-13 02:40:25,512:DEBUG:certbot._internal.main:Arguments: [] 2024-09-13 02:40:25,512:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-09-13 02:40:26,209:DEBUG:certbot._internal.log:Root logging level set at 20 2024-09-13 02:40:26,209:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-09-13 02:40:26,248:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-09-13 02:40:26,290:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 02:40:26,501:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:40:26,502:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-09-13 02:40:26,507:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-09-13 02:40:26,515:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:13 UTC. 2024-09-13 02:40:26,515:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:40:26,515:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:40:26,521:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:40:26,521:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:40:26,521:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:40:26,526:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:40:26,528:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:40:26,530:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:40:26,978:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:40:26,979:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:40:27 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "o9GEpLlnP-M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 02:40:26,979:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:40:32,672:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8472_key-certbot.pem 2024-09-13 02:40:38,104:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8470_csr-certbot.pem 2024-09-13 02:40:38,105:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:40:38,105:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:40:38,253:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:40:38,254:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:40:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwXNzfpsy9vOU22a2OupTh0BEY3IftLWEmPiFl3S4Fk8g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:40:38,254:DEBUG:acme.client:Storing nonce: UAMvsxnwXNzfpsy9vOU22a2OupTh0BEY3IftLWEmPiFl3S4Fk8g 2024-09-13 02:40:38,255:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:40:38,261:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndYTnpmcHN5OXZPVTIyYTJPdXBUaDBCRVkzSWZ0TFdFbVBpRmwzUzRGazhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MJ2RoW2QUuzsPQFXQ_XtQR84YxEo75WIDcvDqR2a7Fi1es43_f25eog5eQ6JgSDZLNKrxskqV06CYdYs48s-iY7VlZnjQpCq54sLzBKTz7JK95L52CeDQG1ztjW-qjdpTymnj0YUo6WzxAvwixG81P1j--XY8ip_2enszq4sUUBUoHckWY3Uf64c3tCO7uV6c02_CLkbCL0vlvzN3P2ZZEjWDvN_H-DscgqwJBPguy38L2UWpWlPmRPRrNcmFUp7fV4GCcGwex7oMp0A7cnTEbp85bp4ZJfsUYb2AwvyNLoaXdw92gqawon9uJHj90Hw8dz-3XqxIOLe6Vec6n668w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-13 02:40:38,434:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-09-13 02:40:38,435:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:40:39 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144772916 Replay-Nonce: UAMvsxnwgQKUvbK3Aj2M611uC0rDvlQ24fGGUW-nn2tFFJORfbw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:30Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144772916" } 2024-09-13 02:40:38,435:DEBUG:acme.client:Storing nonce: UAMvsxnwgQKUvbK3Aj2M611uC0rDvlQ24fGGUW-nn2tFFJORfbw 2024-09-13 02:40:38,435:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:40:38,441:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndnUUtVdmJLM0FqMk02MTF1QzByRHZsUTI0ZkdHVVctbm4ydEZGSk9SZmJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI1NDIzMzYifQ", "signature": "Xhlqc-5oKfaMGwJnX2xykbqwEdLGWSejhMWPXHgT0XJYhEbJEu13qSTz3Fu6HVkjB6Usrui_5twScLq-HONxZigjNnoLqLAMs2zVCBxGw73w4CpAEDFHR6Us9jKXZMIzgDn8aML7YFk56xiwwELr9YtYpuTu4CGmMxkxNyJvM0QvliqZUpz-gVbMqmb_XabvroB8KX7fhN22Rbrr3cdghuyoLaKUcqacNknbImNWKuufuDmBPqA4Begm2kK2lAM3u_UqUOOpryYMJr4GtJB9VN9DOPpLoBnqX0zKWNtkGJgT3S5n-DyQJcLX7OYBz2I9kqL8eZfu_XRF2stb_hrvgQ", "payload": "" } 2024-09-13 02:40:38,596:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122542336 HTTP/1.1" 200 810 2024-09-13 02:40:38,597:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:40:39 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YSt4pi7mtYVwkfM8q-3JBzroZ3-k8LQrrtxpesoHWWu1UY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:30Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/cyyAdg", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/LP3L_w", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/yxREqg", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" } ] } 2024-09-13 02:40:38,597:DEBUG:acme.client:Storing nonce: 0Nvv4YSt4pi7mtYVwkfM8q-3JBzroZ3-k8LQrrtxpesoHWWu1UY 2024-09-13 02:40:38,597:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:40:38,598:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-09-13 02:40:38,609:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:40:38,609:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:40:38,612:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:40:38,612:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:40:38,612:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:40:38,612:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:40:38,618:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:40:38,655:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 02:40:38,854:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:40:38,855:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 02:40:38,856:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 02:40:38,861:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:31 UTC. 2024-09-13 02:40:38,861:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:40:38,861:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:40:38,866:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:40:38,866:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:40:38,867:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:40:38,871:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:40:38,872:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:40:38,874:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:40:39,283:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:40:39,283:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:40:40 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Z7n-kNTCqDg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 02:40:39,284:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:40:44,648:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8473_key-certbot.pem 2024-09-13 02:40:50,022:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8471_csr-certbot.pem 2024-09-13 02:40:50,022:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:40:50,022:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:40:50,159:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:40:50,160:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:40:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUWVUH8qExrhOnnV8LyEA8jszhY_Oiz532tiGyPp0RKOY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:40:50,160:DEBUG:acme.client:Storing nonce: 4OmWUlyUWVUH8qExrhOnnV8LyEA8jszhY_Oiz532tiGyPp0RKOY 2024-09-13 02:40:50,161:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:40:50,166:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVXVlVIOHFFeHJoT25uVjhMeUVBOGpzemhZX09pejUzMnRpR3lQcDBSS09ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Qeb0PAUuU7JPB1TdKN69zTTvIQBD9miGzgnSQ7OdDo2ZTfaFHU7Ja0MiLDtwEQvOvzapZcVcEDAGXulZtNdjFyrIpWebqU3dSG467VhCIqQb5BfR19Hwc0Zcj1WXAOc3FkCTZiaGUyoYHcCFRkxQYowI5u_6_dcX1A4QL5yQn72OH5igiCdYNBbBKrPvvvpsl0LkCiAlgPD39ofNd0osKcwzfYIuojG-wEuRn5aQ_4_2gFbt7aJgxYkBFUXpUoi7oir8oaKoPLkw3Tuy6jBQPdFzVSpxr7b9uA3tcfCk3sLexsYyW1sB80iRKNWjdxgatBaSi2r8bhC-vFcEHKkJVQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-13 02:40:50,355:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-09-13 02:40:50,355:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:40:51 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144813576 Replay-Nonce: 4OmWUlyUXFHZsIky1vFe_GdrtNvpKFLbxpunICW9DQ79YuW0R0Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:43Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144813576" } 2024-09-13 02:40:50,355:DEBUG:acme.client:Storing nonce: 4OmWUlyUXFHZsIky1vFe_GdrtNvpKFLbxpunICW9DQ79YuW0R0Y 2024-09-13 02:40:50,356:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:40:50,362:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVYRkhac0lreTF2RmVfR2RydE52cEtGTGJ4cHVuSUNXOURRNzlZdVcwUjBZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2MDQxNjYifQ", "signature": "p6FAq1l0XNXs15oxZKTnBiQVgHt92dIBdQHJA44BfkAaFGC9C8OLXpUrBg4JHmPGECO3VXW870qS6_Q00ZsGAzFb0H6XHd-_lfUUHGG0quOpIpOqry5trdKBWX_4vn13YtXjUAQCdsMzQkai-bdaTKUQybWnOsTMX_z5lYOXx06P_JuERcuoIvKBQbOdwqXKnDQc9c2aK5c_2MewaE4ro-0faZx_Hucihr10YsK1uBuF6etrDYrNjH7_lM0owOZoZ4Mzh-RfanWBUEx_m9pebMs0V2HfY5tmJGQ4Eajjs5Cy4EqAOyEEuqprlD-RzZAJDD8asiSDfzzdGHHnscHa3g", "payload": "" } 2024-09-13 02:40:50,506:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122604166 HTTP/1.1" 200 804 2024-09-13 02:40:50,507:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:40:51 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQvA3TgiXKkTa3taSHO79BfVHZVEKpHNCL0HAwXcntbeE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:43Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/osHCwQ", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/ZP8ZRQ", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/uKF3Wg", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" } ] } 2024-09-13 02:40:50,507:DEBUG:acme.client:Storing nonce: fCBw7MtQvA3TgiXKkTa3taSHO79BfVHZVEKpHNCL0HAwXcntbeE 2024-09-13 02:40:50,507:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:40:50,508:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-09-13 02:40:50,508:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:40:50,508:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:40:50,509:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:40:50,509:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:40:50,509:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:40:50,510:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:40:50,511:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:40:50,550:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 02:40:50,780:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:40:50,781:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-13 02:40:50,782:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-13 02:40:50,786:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:49 UTC. 2024-09-13 02:40:50,786:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:40:50,787:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:40:50,792:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:40:50,792:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:40:50,792:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:40:50,797:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:40:50,798:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:40:50,800:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:40:51,209:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:40:51,209:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:40:52 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "BhMN8FyP2rc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 02:40:51,210:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:40:56,882:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8474_key-certbot.pem 2024-09-13 02:41:02,160:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8472_csr-certbot.pem 2024-09-13 02:41:02,160:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:41:02,160:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:41:02,298:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:41:02,299:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQ_ebqofTRF6AMvEbhGchu6deKBbJKCFZCXcgnY7KjTyU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:41:02,299:DEBUG:acme.client:Storing nonce: fCBw7MtQ_ebqofTRF6AMvEbhGchu6deKBbJKCFZCXcgnY7KjTyU 2024-09-13 02:41:02,299:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:41:02,305:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFfZWJxb2ZUUkY2QU12RWJoR2NodTZkZUtCYkpLQ0ZaQ1hjZ25ZN0tqVHlVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gc4X2N424Dazjowo6D2ScD_5Vs0EPtyJazDHDkEHsNqtc5pYXsa2mCgSbgwxZ4tLFMPIKmJaTzllSessWV9DciIJWIhYFtkQgdSZjteIiYFY83E8ctlwQlVJsVWGB85mgiL8uGB9_UQsZ9PzQ0RvZCrolnrqaoGZ7WHikvNjFNoKTbDc28_ehi6nUsG8KVp9Pm5F2TF2podXWqFg759f_sB1AZfSQZ3MMZxcb00vwhoZUsUF5AfFx_6a3UeERjyyNq8UsF_PL--TFl4f9BGSMZdLuwmSyEYhRGmEQLPS33Uky1O-bfJHx6Q5tD99wDG2-4tV2TcFfvDK4Glv-KmOcg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-13 02:41:02,597:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-09-13 02:41:02,598:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:41:03 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144849776 Replay-Nonce: 4OmWUlyUBYbthi5zUkoZ4ZAH_caw9UNnQdU07EQOqPQYvaTpSq8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:56Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144849776" } 2024-09-13 02:41:02,598:DEBUG:acme.client:Storing nonce: 4OmWUlyUBYbthi5zUkoZ4ZAH_caw9UNnQdU07EQOqPQYvaTpSq8 2024-09-13 02:41:02,599:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:41:02,604:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVCWWJ0aGk1elVrb1o0WkFIX2NhdzlVTm5RZFUwN0VRT3FQUVl2YVRwU3E4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2NTk1OTYifQ", "signature": "fbOdYPuUmIn8_n62lQzxZAzHGeM5d_VuIjKgFzmm93jW7vYZBGPwGWaB7tWJdSKhO-v3154DZMdb3ncy7f1Iz76584DH2PA8rO8EsVVdEb4wx3BUT1TdljWbhunbNBWNj_bgq2rPLINFr4kpb4kzA3HMCsnK2ntwYU58bKkMd73tBn02xK5roqm44Q_TZDRC7SrRCGMe39muRekubGG9XlcGOlP8B2YWEj1pn98O2gRoTAgQYGcsONffKAyru0257xW80y0r5HkP-6Gf8KnvmkqAOw83Q6Ce84Q26VvQ9y1uKK_Im87Y06mKYgEAjfSI3TaO0SopZ6RvnP_nTlcSUw", "payload": "" } 2024-09-13 02:41:02,758:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122659596 HTTP/1.1" 200 807 2024-09-13 02:41:02,758:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:03 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQ8hSL-u8GJlmKHHHvN7v8re39L7xQepohogLNFUyx48k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:56Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/osx5jQ", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/mCb-BA", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/2L4MUQ", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" } ] } 2024-09-13 02:41:02,759:DEBUG:acme.client:Storing nonce: fCBw7MtQ8hSL-u8GJlmKHHHvN7v8re39L7xQepohogLNFUyx48k 2024-09-13 02:41:02,759:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:41:02,760:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-09-13 02:41:02,760:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:41:02,760:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:41:02,761:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:41:02,761:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:41:02,761:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:41:02,762:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:41:02,763:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:41:02,811:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-13 02:41:03,022:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:41:03,023:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-09-13 02:41:03,024:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-09-13 02:41:03,028:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-09-13 02:41:03,031:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:41:03,078:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-13 02:41:03,276:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:41:03,277:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 02:41:03,278:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 02:41:03,282:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:07 UTC. 2024-09-13 02:41:03,282:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:41:03,282:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:41:03,287:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:41:03,287:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:41:03,287:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:41:03,293:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:41:03,294:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:41:03,295:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:41:03,703:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:41:03,703:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:04 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "vniOl1BHp0s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-09-13 02:41:03,704:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:41:09,334:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8475_key-certbot.pem 2024-09-13 02:41:14,585:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8473_csr-certbot.pem 2024-09-13 02:41:14,585:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:41:14,585:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:41:14,724:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:41:14,725:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQH6bSIIi_7RDmO5YcWkjSvv1V-WdLXIy4tuco6l14B1A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:41:14,725:DEBUG:acme.client:Storing nonce: fCBw7MtQH6bSIIi_7RDmO5YcWkjSvv1V-WdLXIy4tuco6l14B1A 2024-09-13 02:41:14,725:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:41:14,731:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFINmJTSUlpXzdSRG1PNVljV2tqU3Z2MVYtV2RMWEl5NHR1Y282bDE0QjFBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Yraq86CDUqESiNpaBAkGbmEIt4US5bglgStLDvIr-vXm0RVovBhFtm0vY2ltrLNacZBte1tsbHmMnNsQcbiqbJ8qMEWKvlfoTGl206vB5dzSCZvrBdBfczDTCsocJGEF9ZtXmWfmVMPvCiPAl3N1d6Lox6yCfhlO7UJgrH69P7SA2Xjal5q95Om80kZwtYnpxE2YxxvzQjhTB6L1JmJ5pPz_O3xxNL6hjJ_O6CyvDq0b2ZEgVS7T6W3gXm6YqS86wtJJJ1ZM4UvnCM4nE1TPfFBHoABRDHvqRBaA56UdAfcIOq0knPa79g3xoZ6RCbU2YLgBvisVP0Q5KDJvoA9qyA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-13 02:41:15,053:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-09-13 02:41:15,053:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:41:16 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144900966 Replay-Nonce: 4OmWUlyUXhptDqDI_lW37vqEdDJX7PoU0WOgR3uHvSyy24FPSpA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:08Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144900966" } 2024-09-13 02:41:15,054:DEBUG:acme.client:Storing nonce: 4OmWUlyUXhptDqDI_lW37vqEdDJX7PoU0WOgR3uHvSyy24FPSpA 2024-09-13 02:41:15,054:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:41:15,060:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVYaHB0RHFESV9sVzM3dnFFZERKWDdQb1UwV09nUjN1SHZTeXkyNEZQU3BBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3MjkwODYifQ", "signature": "CA3mYLjPxQJEwtLjLvagDIOACBAuPhQurK2k_sZF0I_EahIYIsr06sibq12Zv4VUoMBOmzsgooY7AXlZHt5Sbm2VSiP-pj6AJ2WHSm0TVvM5xU9J91ArVq_uWzy5au9CxES2FgFQSptVF7fJq-17GyIdbpNWHnwWwqR4PrrhnIxvgOFktXLqD0BYDu-7NCX2tUKn1AMxOyhswr9pFWEMgwNs3dlpV07x635w_zzYyPmDIxkosmD0eU6d15QFSKbrlXcXrRoh_-fAUHyp8BivBBhw0vrdKzIQ4XRcK00ZgDLIWbKQEb3N5-ZOYkjR4AvVio-QTAkLQewMh_F_khpTsQ", "payload": "" } 2024-09-13 02:41:15,241:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122729086 HTTP/1.1" 200 801 2024-09-13 02:41:15,242:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:16 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQDKIDYHvy_LMIuiFj_aibIkEHW4hcMp2o2djqN4rafjU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:08Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ShHY7A", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ch6DzQ", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/e_W2mQ", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" } ] } 2024-09-13 02:41:15,242:DEBUG:acme.client:Storing nonce: fCBw7MtQDKIDYHvy_LMIuiFj_aibIkEHW4hcMp2o2djqN4rafjU 2024-09-13 02:41:15,243:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:41:15,243:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-09-13 02:41:15,243:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:41:15,244:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:41:15,245:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:41:15,245:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:41:15,245:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:41:15,245:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:41:15,246:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:41:15,284:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 02:41:15,506:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:41:15,506:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 02:41:15,507:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 02:41:15,511:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:25 UTC. 2024-09-13 02:41:15,512:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:41:15,512:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:41:15,517:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:41:15,518:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:41:15,518:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:41:15,522:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:41:15,523:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:41:15,525:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:41:15,970:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:41:15,971:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:16 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7ubPwczTqWo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 02:41:15,971:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:41:21,426:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8476_key-certbot.pem 2024-09-13 02:41:26,682:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8474_csr-certbot.pem 2024-09-13 02:41:26,682:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:41:26,682:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:41:26,830:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:41:26,831:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YSt3ubLatRwDOAHG6jiAuMrmpFILt_8yGfOBmAK4A51QbU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:41:26,831:DEBUG:acme.client:Storing nonce: 0Nvv4YSt3ubLatRwDOAHG6jiAuMrmpFILt_8yGfOBmAK4A51QbU 2024-09-13 02:41:26,831:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:41:26,837:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3QzdWJMYXRSd0RPQUhHNmppQXVNcm1wRklMdF84eUdmT0JtQUs0QTUxUWJVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "as27sCt8dXxOoGk0vk6RBDM937V31AugteyuZyW3O7O4vlKTImV-tMbda4r_IAfbTVTyWp_ExixKNq1lBTqZWsKEiDX4VqduvRbHCwPCdDVFvEHQIs3oL5ULNw0nuAMYCw15dzlo2JsyUZyu7lr1G1uKZbLqv6sq_BFkBOJQMJnTeIPRWT-1q9PFkcuLO6gPo6L-zTkxlQZtfCRakWqHQYVHmSmp63SrCn-Hdt_MBUaeCy3vmAD1GJ_ncdglbYGB8QFEesrthMyyP9sMaUfl19pbup4ZEw-q3nWxR_15nsJ2Bo6jGX_xHV3DIDQRmahZIR6NNWXbH7M1m5iXQU4I3Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-13 02:41:27,011:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-13 02:41:27,012:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:41:28 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144940076 Replay-Nonce: 0Nvv4YSt0xJbDlw2uJfu1w8Z8rjtuSBqGCnj91puet21vQ_sl1k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:20Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144940076" } 2024-09-13 02:41:27,012:DEBUG:acme.client:Storing nonce: 0Nvv4YSt0xJbDlw2uJfu1w8Z8rjtuSBqGCnj91puet21vQ_sl1k 2024-09-13 02:41:27,012:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:41:27,018:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3QweEpiRGx3MnVKZnUxdzhaOHJqdHVTQnFHQ25qOTFwdWV0MjF2UV9zbDFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3OTAxMzYifQ", "signature": "YH4JT4E-7HMjTjgs9WSMUG9liPdHqsFXxm7twzMDQ2nT7sst26I7tqdS9uBRQHLblCzezblmwoIQQgqh_yeY6TuMpksAIKFCSlTT4eJVVIGgDFzcGodcBvzVh_VZG5CsOz5H7roLHESxaBnfDq4I2R9aFl_ELOX03R77ENYGtjecIl9LOUbtLrv9WAaupJ2Iy7CRBFA1te-B2DFHhK6d0tSCxbdleilIHLGiZrznXOhWnfBrtK6IOcH8LNwsQRYTSd33YN9gzdbIW7Plzwtb_PY-F39vdA5wPovPRWvaSgG2qnE2Edgmn99fQ4OkwCqVEwefpC_9RG0N9LohUc_rXQ", "payload": "" } 2024-09-13 02:41:27,173:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122790136 HTTP/1.1" 200 805 2024-09-13 02:41:27,173:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:28 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStxddLzxacsCbQ5RqGwz1CX1BmUytN2kpvapf8wsjRcIg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:20Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/HbiFxg", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/X2nDCw", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/fCm5hA", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" } ] } 2024-09-13 02:41:27,173:DEBUG:acme.client:Storing nonce: 0Nvv4YStxddLzxacsCbQ5RqGwz1CX1BmUytN2kpvapf8wsjRcIg 2024-09-13 02:41:27,174:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:41:27,175:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-09-13 02:41:27,175:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:41:27,176:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:41:27,176:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:41:27,177:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:41:27,177:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:41:27,177:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:41:27,178:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:41:27,230:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-13 02:41:27,651:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:41:27,652:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-13 02:41:27,653:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-13 02:41:27,658:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:43 UTC. 2024-09-13 02:41:27,658:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:41:27,658:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:41:27,663:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:41:27,663:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:41:27,663:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:41:27,668:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:41:27,669:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:41:27,671:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:41:28,078:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:41:28,078:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NLaLnhw112Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 02:41:28,079:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:41:33,512:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8477_key-certbot.pem 2024-09-13 02:41:38,775:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8475_csr-certbot.pem 2024-09-13 02:41:38,775:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:41:38,776:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:41:38,914:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:41:38,915:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUSIqj16SOh_6FWC3hVr8mjOBMGUACZhxxSEeDJeGWq5g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:41:38,915:DEBUG:acme.client:Storing nonce: 4OmWUlyUSIqj16SOh_6FWC3hVr8mjOBMGUACZhxxSEeDJeGWq5g 2024-09-13 02:41:38,916:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:41:38,924:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVTSXFqMTZTT2hfNkZXQzNoVnI4bWpPQk1HVUFDWmh4eFNFZURKZUdXcTVnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "WGURjgmsotLflZEapoaFBEsBCT5IUgfBo0OM2bCvRw1mJNfYwnipX779OzHJjWH_ADDJxK4GnH0kq-jPBkp2li_r-teWaGu1YNj7u9c3pzhfwZh8IR81rnsMll5nntq4-aI6BBd_91bN3fGtEh4_7RY1Gm2NZ98fVoVmucc9hbWt_EBxNd5QxHjYXDjlj0euIJrxk6PhX-EdAC56oMruW17O4JHfPW_dxYSZ3t1USF2z23cN1E4CZWDyDttn0hcp9njia7CKG_GIKCrtnQjGxwjAztG2fYW-v57_ktj5njV7GVhIjc0AO6tslYwamZB1nGhMPdyY35nzp_dIScZ7Cg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-13 02:41:39,123:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-09-13 02:41:39,124:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:41:40 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144979426 Replay-Nonce: 4OmWUlyUsYT9KumZDfHtFglFW6Qsz8UE3reiSyYoBJgv-_rdR4E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:33Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144979426" } 2024-09-13 02:41:39,124:DEBUG:acme.client:Storing nonce: 4OmWUlyUsYT9KumZDfHtFglFW6Qsz8UE3reiSyYoBJgv-_rdR4E 2024-09-13 02:41:39,124:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:41:39,130:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVzWVQ5S3VtWkRmSHRGZ2xGVzZRc3o4VUUzcmVpU3lZb0JKZ3YtX3JkUjRFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI4NTExMzYifQ", "signature": "FY4WaW6vzsqHLhdap-UM4H71O7YkN1DVTTT0Pm_j5rGNI2qZehRbqY5LL_K10uOVAjIJAY-IBry3G14xeVjiks1EPxH77lVT_OVTu_It4ZmP29xdrruK-_7tQwI7I1l4IQoQAnT5EZvprgSlrG1VYfe6i6MEDqZdv4rj3UXpCZ4YreQGaBuUrgyYRWMJI_--CPkD5VO3NXrQ5ZqoK6WXBFd7kfU0KQ2gvb_DsMiWVkrnQY3o7hZ6J6eNvfllc9YdSYOlxV25bM3nSXRv2S9p88BYBltEmglUQr4P43_6lRlXQ67OJH0o2fa_6-O7GVPb-bSkj2DCamH3ZiAk9GrZqA", "payload": "" } 2024-09-13 02:41:39,276:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122851136 HTTP/1.1" 200 809 2024-09-13 02:41:39,277:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:40 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQ0C2aIOvHNG8IC6p3wW2TOREAjOlSLFncxk7IQTTF-NU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:33Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/kuyLHA", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/Kdwo9g", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/nTAn0w", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" } ] } 2024-09-13 02:41:39,277:DEBUG:acme.client:Storing nonce: fCBw7MtQ0C2aIOvHNG8IC6p3wW2TOREAjOlSLFncxk7IQTTF-NU 2024-09-13 02:41:39,279:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:41:39,280:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-09-13 02:41:39,280:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:41:39,280:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:41:39,281:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:41:39,281:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:41:39,282:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:41:39,282:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:41:39,283:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:41:39,328:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-13 02:41:39,517:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:41:39,519:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-09-13 02:41:39,519:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-09-13 02:41:39,523:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:14 UTC. 2024-09-13 02:41:39,523:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:41:39,524:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:41:39,528:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:41:39,529:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:41:39,529:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:41:39,533:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:41:39,534:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:41:39,536:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:41:39,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:41:39,977:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:40 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "GmmwY_INLqM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 02:41:39,978:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:41:45,578:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8478_key-certbot.pem 2024-09-13 02:41:50,883:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8476_csr-certbot.pem 2024-09-13 02:41:50,883:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:41:50,883:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:41:51,031:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:41:51,032:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnw6GeaY4hu9as0wZhbP3JNVUt7mzvYe3-nFmHVrNc2wdc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:41:51,032:DEBUG:acme.client:Storing nonce: UAMvsxnw6GeaY4hu9as0wZhbP3JNVUt7mzvYe3-nFmHVrNc2wdc 2024-09-13 02:41:51,032:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:41:51,038:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bnc2R2VhWTRodTlhczB3WmhiUDNKTlZVdDdtenZZZTMtbkZtSFZyTmMyd2RjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "RFXVVpCB1D9M2mpEVRsb_FCdzFM_o69SC_rVHDwk9kz02oeA_buysjwE2LsHZX_ILO-xC03ffSiNm_u9CVjJ8Q-quY2vVzsmAS3NqCoBvL31fseW_PuRjLeg145ngTLqjr7p7_PSt7m7cPFi5-lGau4y0gaFz64bzMvZ_maL4gfd4As1jg3Zdi6snerRzd_kwRQi7u05ugoyBt9im89Cwfa_ye7Vwww05i7kI359Mj671rGc-idadB3SNXPkevTCSzRvKigQaGMWn-xw_ISUPNya6mNwAq9ZJ8oxBbdeqGcVFUrHgcw7-W99kRcuvp2JRXpBxF56qIXeBUsOdL565g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-13 02:41:51,213:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-09-13 02:41:51,213:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:41:52 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145018096 Replay-Nonce: UAMvsxnw6Vp4LltJrE3gBfbu3tmkB0x6TybYyuCGRqtOS9nIqG4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:45Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145018096" } 2024-09-13 02:41:51,214:DEBUG:acme.client:Storing nonce: UAMvsxnw6Vp4LltJrE3gBfbu3tmkB0x6TybYyuCGRqtOS9nIqG4 2024-09-13 02:41:51,214:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:41:51,220:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bnc2VnA0TGx0SnJFM2dCZmJ1M3Rta0IweDZUeWJZeXVDR1JxdE9TOW5JcUc0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5MTA5OTYifQ", "signature": "ohC9YmCwNfl3UDJfe-d8MO6RCueSOOGGVSdj5gx9BuAMEfRnWigDsGIDDd3SsUXMFx6MXTgxYOxEoRuLI_8P60lqvhPMT7Ksa2FRoBIJOdA5uHEGRrQ4Y4K2xCxRHAfbnuuSFn_UUcdBLp1ZtBGOixHtKPnn_nAlJQ4qBsE1Uy01TDTMPLj8NMxvsWgUH7sdJ7LmAw4M2tXGlg10ZXCrWKxbjosReDx9VoD14fjV8PXB16TPhQJNmotWxoTNsaSvbAisUinyp9ID-0EsTHnmafMVLG_ywcHeL_2KJ2izCqBNLPn6nXO5J3UKm6LWwOsXRFOav5__DrXg8j17-6KaRA", "payload": "" } 2024-09-13 02:41:51,372:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122910996 HTTP/1.1" 200 807 2024-09-13 02:41:51,372:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:52 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStIGJbk7CRYd5CjGjuAxdVqiV8jbWyMzakElre1bG6pxY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:45Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/Xg0Zog", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/QNmv8g", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/4_hHkg", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" } ] } 2024-09-13 02:41:51,373:DEBUG:acme.client:Storing nonce: 0Nvv4YStIGJbk7CRYd5CjGjuAxdVqiV8jbWyMzakElre1bG6pxY 2024-09-13 02:41:51,375:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:41:51,375:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-09-13 02:41:51,375:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:41:51,375:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:41:51,376:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:41:51,376:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:41:51,376:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:41:51,377:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:41:51,378:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:41:51,416:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-13 02:41:51,680:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:41:51,681:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 02:41:51,682:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 02:41:51,687:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:33 UTC. 2024-09-13 02:41:51,687:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:41:51,687:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:41:51,692:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:41:51,692:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:41:51,692:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:41:51,697:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:41:51,698:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:41:51,700:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:41:52,147:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:41:52,147:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:41:53 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-i4IAXfhU8E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 02:41:52,148:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:41:57,494:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8479_key-certbot.pem 2024-09-13 02:42:02,805:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8477_csr-certbot.pem 2024-09-13 02:42:02,806:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:42:02,806:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:42:02,955:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:42:02,955:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStkX0rsO5bQrf6KKUAXFYpIpyb-8L_AdMixXTSQbjW-wA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:42:02,956:DEBUG:acme.client:Storing nonce: 0Nvv4YStkX0rsO5bQrf6KKUAXFYpIpyb-8L_AdMixXTSQbjW-wA 2024-09-13 02:42:02,956:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:42:02,962:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RrWDByc081YlFyZjZLS1VBWEZZcElweWItOExfQWRNaXhYVFNRYmpXLXdBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "IUDxvbqg1vwlEh9caPVsuRZ0S0vmr539A9UePRDAOV012Yu50Phk0cORp15W1PSnltFV_aFLpJjUCgBJt2NLMxSpdVb9PsvPFKJMwcy7reJIfzotyTfOPXFDH6eL7S0ZU-x4XLb-XJoCWR3QXngB1mfoP1A5_UMhffcf4zbN5T6SnsfOqcTfnMnkKTedPXMqMouSzsad9FYKNuiQRRQJ2kHnuVtqYB_qaUvVMW70xUS8w_Sa6NecIjDHqoce2-07-BcOoTppm1KVMvT99D7CePudDgBguN6pZVmreXM8LHVA8w49UqNAJUcGY9BZFSOOyf8jhKVP1WsxNLnE23CzDg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-13 02:42:03,138:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-09-13 02:42:03,139:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:42:04 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145056036 Replay-Nonce: 0Nvv4YStHydqY9U04flrNaXKcgEwE-1Rcc5L3nIXuwULe2pGqzs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:58Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145056036" } 2024-09-13 02:42:03,139:DEBUG:acme.client:Storing nonce: 0Nvv4YStHydqY9U04flrNaXKcgEwE-1Rcc5L3nIXuwULe2pGqzs 2024-09-13 02:42:03,139:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:42:03,145:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RIeWRxWTlVMDRmbHJOYVhLY2dFd0UtMVJjYzVMM25JWHV3VUxlMnBHcXpzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5NjY5OTYifQ", "signature": "LQTmLnP9P4I1MZMAkBGGC_bHt1d7h1pm52wjLV6-KLsSawCdAi5LMepqNMraFjcZDJ25iq-unQ-MOg_BGwxWntOa9N1iRMqBWRSnW6O2rlQ5KPAmg5lDMGEdlyt1PpEItx7U-iwdpam17ifKG7KDdA25oFGBRJJhos4cDdB0thXJDucU4Ema6gxRg6I5NxpeB2E5m9fKLnd3phECla28oSL-YyOoD27DCQ4-pqcKyQkFTz8e2tn8GYqPHGDsn-m1psakpawq9eFkgb-KO_cBAu_lrSNHQC3R_i8YFAKEwvNnU0qSXFhxyYXsvKZS59NzYzoq12hHJSIGDsGcO9gZyA", "payload": "" } 2024-09-13 02:42:03,300:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122966996 HTTP/1.1" 200 806 2024-09-13 02:42:03,301:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:04 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YSt1h64AHiSXb2wo1_Kt0dTJhlGq24xlCO4vaiRlSRi_Uo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:58Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/lsTunA", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/RuQu8g", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/9cCtaA", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" } ] } 2024-09-13 02:42:03,301:DEBUG:acme.client:Storing nonce: 0Nvv4YSt1h64AHiSXb2wo1_Kt0dTJhlGq24xlCO4vaiRlSRi_Uo 2024-09-13 02:42:03,303:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:42:03,303:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-09-13 02:42:03,304:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:42:03,304:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:42:03,305:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:42:03,305:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:42:03,305:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:42:03,305:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:42:03,306:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:42:03,353:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-09-13 02:42:03,353:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:42:03,353:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-09-13 02:42:03,359:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-09-13 02:42:03,362:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-09-13 02:42:03,362:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-09-13 02:42:03,362:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-09-13 02:42:03,363:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-09-13 02:42:03,364:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-09-13 02:42:03,406:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 02:42:03,640:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:42:03,641:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 02:42:03,641:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 02:42:03,646:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:53 UTC. 2024-09-13 02:42:03,646:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:42:03,647:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:42:03,652:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:42:03,652:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:42:03,652:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:42:03,657:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:42:03,658:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:42:03,660:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:42:04,069:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:42:04,069:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:05 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "slaEOxT7OnI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-09-13 02:42:04,070:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:42:09,636:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8480_key-certbot.pem 2024-09-13 02:42:15,010:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8478_csr-certbot.pem 2024-09-13 02:42:15,011:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:42:15,011:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:42:15,149:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:42:15,150:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQQa-TzAZLHa2WxQvSbAdeC_LbK5VpYY9TJ5ywvJ14AvQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:42:15,150:DEBUG:acme.client:Storing nonce: fCBw7MtQQa-TzAZLHa2WxQvSbAdeC_LbK5VpYY9TJ5ywvJ14AvQ 2024-09-13 02:42:15,150:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:42:15,156:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFRYS1UekFaTEhhMld4UXZTYkFkZUNfTGJLNVZwWVk5VEo1eXd2SjE0QXZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vwz1EKzeKbQ4VRAt3ZiOTZkazHao_GFiOQ-qoyCbyx5c5W1Y52q1ClJ8gTf5JwpbYo-NfZA0ZYM5dreyZVtGvc_6DKA-PI-o34PsforirDlsRwy7mP_ehRfkF2_WK7uZNYZX6dW0f05wVY2I8dqh90T6Wk5ZuzzF9Cx_DmOsTc2WCjYreNV3Z_W7E1H-Nthh9lK7rYoSndvd-cSNa9O7q9Hjpcf61l16zYOEpOORWN6r3WtJRj-aMJ-HQOeR4YIN34mCThtAabh7TKthHCT0M5MyF-vdSV-Pvm2RQkxzWGUemt-UAKA2Wl684lBvhHJDyOB-PpGjMiV4R0SSs3mrdQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-13 02:42:15,357:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-09-13 02:42:15,358:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:42:16 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145110166 Replay-Nonce: 4OmWUlyUFBPBmybvoat-tjt5ORJS_mwHGTLw49ykFJN1-ua6h8Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:11Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145110166" } 2024-09-13 02:42:15,358:DEBUG:acme.client:Storing nonce: 4OmWUlyUFBPBmybvoat-tjt5ORJS_mwHGTLw49ykFJN1-ua6h8Q 2024-09-13 02:42:15,358:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:42:15,364:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVGQlBCbXlidm9hdC10anQ1T1JKU19td0hHVEx3NDl5a0ZKTjEtdWE2aDhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMwNDM0ODYifQ", "signature": "TsPGio9fg7G6x6bVvHafMuNrbs-_Ialkm5oZcBfj2xAvtT80Pj0uWSOaGtM7LAa3RBaOPQGPqZMJhEOcBqn3wPBMKlnXJCd-68f3FzwMw0Yu2cIyia-W2_BHmb7fiKZSELVQaUj7t-OpGX-GPLrmASJyjb5bu5MezxxQAxJyxYEGGFOEjH_EQGmJlTdmKGTnY9D4D6eopjlVcUUO0rZcLIeFpiJ150lIRrOc20AWeqr9Tbw60sjRBljOjCLRx1ZjzfY3n4kG1dmymlDe49quKBcQLf2pYkSqF-I74TATdv7nLr8aoPPhYSZrgRFgXvmEQilljOMlFMog3w8Nx9Gs4Q", "payload": "" } 2024-09-13 02:42:15,511:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123043486 HTTP/1.1" 200 811 2024-09-13 02:42:15,512:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:16 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUMUFO7SkLKWH8NhaOER8NjOhwUeOK_qdYY_zALmNpZiw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:11Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/5SnKCA", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/oHWByA", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/6UDG0g", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" } ] } 2024-09-13 02:42:15,512:DEBUG:acme.client:Storing nonce: 4OmWUlyUMUFO7SkLKWH8NhaOER8NjOhwUeOK_qdYY_zALmNpZiw 2024-09-13 02:42:15,513:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:42:15,513:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-09-13 02:42:15,514:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:42:15,514:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:42:15,515:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:42:15,515:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:42:15,515:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:42:15,516:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:42:15,517:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:42:15,580:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-13 02:42:15,804:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:42:15,805:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 02:42:15,806:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 02:42:15,811:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:20 UTC. 2024-09-13 02:42:15,811:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:42:15,811:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:42:15,816:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:42:15,816:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:42:15,816:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:42:15,821:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:42:15,822:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:42:15,824:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:42:16,267:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:42:16,267:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:17 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Q3PhoC1lcj4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 02:42:16,268:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:42:21,661:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8481_key-certbot.pem 2024-09-13 02:42:27,041:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8479_csr-certbot.pem 2024-09-13 02:42:27,041:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:42:27,041:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:42:27,190:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:42:27,190:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStGwD3tduoc07U1ORX0GB-eomq47WHxuxsaQAgNRvc5JI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:42:27,191:DEBUG:acme.client:Storing nonce: 0Nvv4YStGwD3tduoc07U1ORX0GB-eomq47WHxuxsaQAgNRvc5JI 2024-09-13 02:42:27,191:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:42:27,198:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RHd0QzdGR1b2MwN1UxT1JYMEdCLWVvbXE0N1dIeHV4c2FRQWdOUnZjNUpJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "TDC-VZWSyeTymcYBL4HrPvYzG_UMpWNmWBOlhXqHKrMBo0bCCAnKy_tg6RzronXuQyxdDucxRq8bm6jr2rWH880HpuO7i1zoNE90FIUKVMJqmc1VLL4Dcr7LEqfmAm4g-8ZHbWNkuARMEXEd5Cj72dl1G-u99I3oLc38OXwlfVZFJmuyd84Vg9FbZAaJiintflD4hM1Ln_WnmORf3MgOFXduXXusQG7fn5xSdWqeRzF07i9vc_XnBw8Kw5aysnEJI2F1LAKnbqBIwl-319FHBmnbsBtdVBlY2Mra6yk8Ge12ZyDASdDAW57Sw7BFaEtNdsDs7n6MoNU72KThn1VO1A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-13 02:42:27,373:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-09-13 02:42:27,374:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:42:28 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145156016 Replay-Nonce: UAMvsxnw9RorQV7X9VgwsU_5V-H_Jvui3Li07S1cAztwcWBiQ_w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:24Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145156016" } 2024-09-13 02:42:27,374:DEBUG:acme.client:Storing nonce: UAMvsxnw9RorQV7X9VgwsU_5V-H_Jvui3Li07S1cAztwcWBiQ_w 2024-09-13 02:42:27,375:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:42:27,380:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bnc5Um9yUVY3WDlWZ3dzVV81Vi1IX0p2dWkzTGkwN1MxY0F6dHdjV0JpUV93IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxMTQzNjYifQ", "signature": "trzT1dXgnwN0fYOm5QRrfzdSTJvC4UaoPB82J0ERAYMfONZ_5APhBbOk-bFRcLEY2E1COZRTgMVWd2QWhFgJO2T4nk2claXRfuI9nZGp85DdTRdegsLnq857NfnPYiDWqweMMZUH3H2d26beyj5LGO6jhnFDwBlqUfTXXsSvzq2VG_JN95IZURvFVUXhXRMs0390sgZOEx2B2j_PEgeZrWrm3z39_1h3i2f1UlXKVskKgCX8EmWSUnZZh2xRjxSQYeNEEmIfdVlqIeBMYuuq_H3oEKhVTdeoF0iW_w9Lhk7RlEl5uav32HLfgRAF2LXr2EextxZrhsHE4rCtz_-Q3Q", "payload": "" } 2024-09-13 02:42:27,534:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123114366 HTTP/1.1" 200 810 2024-09-13 02:42:27,535:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:28 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnw2UtQs0G4E4v7S4w7GY1hhZ9gHVG_qX2IPjNbJxZPpUU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:24Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/hpZofw", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/0k48SQ", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/K6FLfA", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" } ] } 2024-09-13 02:42:27,535:DEBUG:acme.client:Storing nonce: UAMvsxnw2UtQs0G4E4v7S4w7GY1hhZ9gHVG_qX2IPjNbJxZPpUU 2024-09-13 02:42:27,535:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:42:27,536:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-09-13 02:42:27,536:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:42:27,537:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:42:27,537:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:42:27,538:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:42:27,538:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:42:27,538:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:42:27,539:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:42:27,585:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 02:42:27,895:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:42:27,896:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-09-13 02:42:27,897:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-09-13 02:42:27,901:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:39 UTC. 2024-09-13 02:42:27,901:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:42:27,902:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:42:27,907:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:42:27,907:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:42:27,907:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:42:27,912:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:42:27,912:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:42:27,914:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:42:28,354:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:42:28,354:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "yWs5vtQ-6wQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-09-13 02:42:28,355:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:42:33,699:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8482_key-certbot.pem 2024-09-13 02:42:38,970:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8480_csr-certbot.pem 2024-09-13 02:42:38,971:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:42:38,971:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:42:39,119:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:42:39,120:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStrIkgByF6D0FBW_8R95O7YIZaOv7Im-Mg6lcz6MU5NkY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:42:39,120:DEBUG:acme.client:Storing nonce: 0Nvv4YStrIkgByF6D0FBW_8R95O7YIZaOv7Im-Mg6lcz6MU5NkY 2024-09-13 02:42:39,120:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:42:39,126:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RySWtnQnlGNkQwRkJXXzhSOTVPN1lJWmFPdjdJbS1NZzZsY3o2TVU1TmtZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "VLyw50Z9UTp6q_c98uqfAdsGF8T3QAjX9O9DStOmi5ogC_sRUk0Lh8fM543eWu31KTBIbUkVyR1gRFLGMY3xo8qg6QhVJBusfkCb-p-odvnK-WPzPpXVhDhrQEqFOygefny28WJ-xIN7gtiu9pUL17FuhX6QKuHSPGp5rT6INbNiy5g5qZTgsNkF8D1-dY7h0N8WMVFFA6yaVBpUUu8PTFCUxVTZ9fa0-OfjsiCyXuFdO7mzU0QlO7xahvqbrWnS3qdy-qjDl85rz-epRetgUNVaf5By_2talQOJFzJts58WX4aJZoiehJvJOwPzZsTgYDLkVciqlA9M6pPma8Ssdg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-13 02:42:39,300:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-09-13 02:42:39,301:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:42:40 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145193816 Replay-Nonce: UAMvsxnwVvuYMTusJwbe81znYv4R7NGRM3gcxhnXpe7r2wFhw3U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:37Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145193816" } 2024-09-13 02:42:39,301:DEBUG:acme.client:Storing nonce: UAMvsxnwVvuYMTusJwbe81znYv4R7NGRM3gcxhnXpe7r2wFhw3U 2024-09-13 02:42:39,301:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:42:39,307:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndWdnVZTVR1c0p3YmU4MXpuWXY0UjdOR1JNM2djeGhuWHBlN3Iyd0ZodzNVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxNzMyODYifQ", "signature": "gfPKKUw4gKlPzkwGudw3CS4rMgq1WuI8wwGK_oSqnmRFaK9q1rp8AWj32et9GU7EsOSklERTCVaAHJJ9992-ygEjMK_Ryo-IU_WDrbfm4pL_FFs3jgZGKdDYhY7ZmMIr-hD-UfHn33GxnNrMUpByJK0iHMclZiZPh7zvoFryH9u9L4hdK7ascrd__wtbpJU4IDzYKwPHEyCaZN3KiqrFPjqlBs6kO69vEXVrqcCTGQevIyPC-2HVdhhfWwV2_O1usAVl-IZ0HgwYxx-fEWefDH_0603M3D3SiO304O4AwOBsdg6izO0gtJKxRY6e_MqAREe-VvGQ8z9TPT4sj18Wuw", "payload": "" } 2024-09-13 02:42:39,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123173286 HTTP/1.1" 200 809 2024-09-13 02:42:39,461:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:40 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwDzo553HXbgNkRyIraU4_TRAE4vCykNtFRn_XqaLVjlc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:37Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/xZ9qpw", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/S6yiLg", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/QeJIqg", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" } ] } 2024-09-13 02:42:39,461:DEBUG:acme.client:Storing nonce: UAMvsxnwDzo553HXbgNkRyIraU4_TRAE4vCykNtFRn_XqaLVjlc 2024-09-13 02:42:39,462:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:42:39,463:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-09-13 02:42:39,463:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:42:39,463:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:42:39,464:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:42:39,464:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:42:39,464:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:42:39,465:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:42:39,466:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:42:39,515:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 02:42:39,743:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:42:39,744:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-09-13 02:42:39,745:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-09-13 02:42:39,750:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:57 UTC. 2024-09-13 02:42:39,750:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:42:39,750:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:42:39,755:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:42:39,755:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:42:39,755:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:42:39,760:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:42:39,761:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:42:39,763:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:42:40,213:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:42:40,213:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Iwsql3XjbhM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 02:42:40,214:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:42:45,601:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8483_key-certbot.pem 2024-09-13 02:42:51,014:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8481_csr-certbot.pem 2024-09-13 02:42:51,015:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:42:51,015:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:42:51,163:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:42:51,164:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwPfN-E1BqKHfrK88IV73hm9YwxB_GUfKGYpEg8RnIUDY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:42:51,164:DEBUG:acme.client:Storing nonce: UAMvsxnwPfN-E1BqKHfrK88IV73hm9YwxB_GUfKGYpEg8RnIUDY 2024-09-13 02:42:51,164:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:42:51,170:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndQZk4tRTFCcUtIZnJLODhJVjczaG05WXd4Ql9HVWZLR1lwRWc4Um5JVURZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FnXTPjX6cEUGVN82SmSty9DmDIQpIE1boM8wDfsc3h9XAtlRw-O2OHYyuHcniyGh2U7jUCZCTpuz0gymIX3AkVaQl2HIz3qedYMckkhK6hVnIq0m1KhzM0DYGTf8u5hWC-GESHybuRWLAOZ_TB7K--8xjAx--5Ho2RkWBiS6snxswOrJuMwQwstCTLHnoJZyR8ZHCwzN6ePmIiHx0WWPwfqZg48Sg2Rwt8l23BrdbHk_QLJx9LEfWQSlQTrI2FeqoTsh7gmS_ameyaoJb1EqKF7iKo1Tsf7OtXHd-Jc4WCyCDLdWkKFaLoPKN0qWjw84kDlXJZIHtrk3ZIDuLCbrZg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-13 02:42:51,345:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-13 02:42:51,346:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:42:52 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145229456 Replay-Nonce: UAMvsxnwlcFqKSf4qO6kDCS8KRpe5Dv9NGIhqA-ASyKjccpSQVs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:49Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145229456" } 2024-09-13 02:42:51,346:DEBUG:acme.client:Storing nonce: UAMvsxnwlcFqKSf4qO6kDCS8KRpe5Dv9NGIhqA-ASyKjccpSQVs 2024-09-13 02:42:51,346:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:42:51,352:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndsY0ZxS1NmNHFPNmtEQ1M4S1JwZTVEdjlOR0locUEtQVN5S2pjY3BTUVZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyMjk1MDYifQ", "signature": "KqgcdyULEmWS93H2PJr2c8XtPQiIExRmqee9MeUpcGQ5rLt-qqT-aY9Sk3O1Jq-ntH1XvwR5kOPfLptu5Ybulrim4ddFRRZrzoYRCHL8At2rnxdlzj7HQC1_-1fPNiGVqrxvrEqK540G_2cWTfvrBdaSvwsZy2RSUhBkpuieiNj2Iq2pldDIvFPQ_2MkxhCMMtRYuYZTtrsu1LvkMSsG7c32cEu62cGPRY_9DpMD1XH4aDNzFDGuzjkLWSVXq2M9uV_vODEcysyW9cW7_0tWIiwp9ahMyLl_nEYkXmJ5qT8zI1iBJkxGw9HMX55UIHyYTbBcj73kUTBg0KzjUehpHA", "payload": "" } 2024-09-13 02:42:51,507:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123229506 HTTP/1.1" 200 805 2024-09-13 02:42:51,508:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:52 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YSt8QZCLlCawTkjqMH8ib8l9apF7VT_glhjaiK0Rv4PQs4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:49Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/K5UDEQ", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/yzBBsQ", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/gbt7DA", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" } ] } 2024-09-13 02:42:51,508:DEBUG:acme.client:Storing nonce: 0Nvv4YSt8QZCLlCawTkjqMH8ib8l9apF7VT_glhjaiK0Rv4PQs4 2024-09-13 02:42:51,508:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:42:51,509:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-09-13 02:42:51,509:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:42:51,510:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:42:51,510:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:42:51,511:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:42:51,511:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:42:51,511:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:42:51,512:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:42:51,552:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 02:42:51,750:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:42:51,751:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-13 02:42:51,752:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-13 02:42:51,757:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:15 UTC. 2024-09-13 02:42:51,757:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:42:51,757:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:42:51,763:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:42:51,763:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:42:51,763:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:42:51,768:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:42:51,769:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:42:51,771:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:42:52,214:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:42:52,214:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:42:53 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9tHgRbF0mqQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 02:42:52,215:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:42:57,837:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8484_key-certbot.pem 2024-09-13 02:43:03,147:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8482_csr-certbot.pem 2024-09-13 02:43:03,148:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:43:03,148:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:43:03,296:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:43:03,296:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:43:04 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnw79jQK67LAlDY9I2PBbaBWBy1US9UFch9Z7MGEbCY-qw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:43:03,296:DEBUG:acme.client:Storing nonce: UAMvsxnw79jQK67LAlDY9I2PBbaBWBy1US9UFch9Z7MGEbCY-qw 2024-09-13 02:43:03,297:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:43:03,304:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bnc3OWpRSzY3TEFsRFk5STJQQmJhQldCeTFVUzlVRmNoOVo3TUdFYkNZLXF3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "UML1JK9km8FZgAOxI9-qvfILVXoEkVGzigsfJR6rZkoh4sUfRXKKRqgiL4h61RhLd5vnb-1Bd7C8WGXtBXGa4zU69DICHs6gKXGVvFSrW5gehKaXk7SwJE7QZmYgpH1MJvHCKVhh0aGYto0Z_KlWqSs293nug7eFQksjE5nYMIxlfL-FT3tCwhp89p2ezycq7F5VB2ZkVnk-3BWHO1Dhk3Aah0xzVm-IKvZSGPKqrH1Ka6SlHHmu8ab3c8ZSVxCv2tvF5N9_FdKhs_PTdMIv2neVzDai5HZxVCFuOnAgq64i1ylFPNs6i1Fd4XXG5QgAgdgnyJ_guDpw0iQ0yjLXzg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-13 02:43:03,485:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-13 02:43:03,486:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:43:04 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145265276 Replay-Nonce: 0Nvv4YStMJCs_2T1ZMZJizY3-MIIMC69xAZmeDe8pfUW7YbLCIg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:57:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145265276" } 2024-09-13 02:43:03,486:DEBUG:acme.client:Storing nonce: 0Nvv4YStMJCs_2T1ZMZJizY3-MIIMC69xAZmeDe8pfUW7YbLCIg 2024-09-13 02:43:03,486:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:43:03,492:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RNSkNzXzJUMVpNWkppelkzLU1JSU1DNjl4QVptZURlOHBmVVc3WWJMQ0lnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyODY1ODYifQ", "signature": "VWUMV9RXgG47DjsbTMnSQwFJ-stRbZLw-KmR9zKNOtujhYRFD-CcaZWzerkrNtWOllaHPY0n3Qwa_igYTwSc3ihuE8LGPBlFSqw1HzkX2RGC7VPneKtiP5YDI61mmo39tEjvutqp9d5EXfZaYR0L7ZaXiZZPMe30n7CtrB4nPS7JQXDH024BSUy4adSxLD9rK1Pw-FCNXnvWe44uy-leEuB_agoxJQq-DWQxF7jPadbTufo_7tqa7WAUZyMd4U2YaWGjQC3t_Xs6n5UAuMQJWfBvMvsdbQw1MblJl3TSds8WQCgn4CRiAOk5Gme-ERp3twtP4RoYXgPcKNoigN7-zw", "payload": "" } 2024-09-13 02:43:03,645:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123286586 HTTP/1.1" 200 805 2024-09-13 02:43:03,646:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:43:04 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStFksTahVD5QRZKl8unvpM26V4Ys21F7wK5EfB7Tm3_cw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:57:01Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/dinKKw", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/B20YQg", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/S9gNtg", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" } ] } 2024-09-13 02:43:03,646:DEBUG:acme.client:Storing nonce: 0Nvv4YStFksTahVD5QRZKl8unvpM26V4Ys21F7wK5EfB7Tm3_cw 2024-09-13 02:43:03,646:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:43:03,647:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-09-13 02:43:03,647:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:43:03,647:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:43:03,648:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:43:03,648:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:43:03,648:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:43:03,649:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:43:03,650:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:43:03,698:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-13 02:43:03,903:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-13 02:43:03,904:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-13 02:43:03,905:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-13 02:43:03,909:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:30 UTC. 2024-09-13 02:43:03,909:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-13 02:43:03,910:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-13 02:43:03,915:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-13 02:43:03,915:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-13 02:43:03,915:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-13 02:43:03,920:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-13 02:43:03,920:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-13 02:43:03,922:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-13 02:43:04,371:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-13 02:43:04,373:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:43:05 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "f7qxaZQTikc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-13 02:43:04,373:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-13 02:43:09,925:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8485_key-certbot.pem 2024-09-13 02:43:15,170:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8483_csr-certbot.pem 2024-09-13 02:43:15,171:DEBUG:acme.client:Requesting fresh nonce 2024-09-13 02:43:15,171:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-13 02:43:15,318:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-13 02:43:15,319:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:43:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwjDdak6zWVw27uvpCoT5CUI4ebBg1e-whVRX-bA1HIco X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-13 02:43:15,319:DEBUG:acme.client:Storing nonce: UAMvsxnwjDdak6zWVw27uvpCoT5CUI4ebBg1e-whVRX-bA1HIco 2024-09-13 02:43:15,319:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-09-13 02:43:15,325:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndqRGRhazZ6V1Z3Mjd1dnBDb1Q1Q1VJNGViQmcxZS13aFZSWC1iQTFISWNvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "j_c46Oza0Ug3KRCtLSKSJ78txnrZUET9C8jQhnCYVV9GED41exql3beS14a0pv8lnCFELRwh1_39DxrYMST-AY87TNdM7XG0pP2YNQQSIFJosSQ1pggZ5_dL_1Odl86x32XkMaFc6O3mUZhYubiZTktFfg7Q7gr4Y3RvlIzEfmN1TBbxFjWuUJgEIzNwNkYx07BYLTI390u-eTy8Jl6CBI_cHLDa_VcL_dVmvHbAyuQIedD-hP95VVW85-RGislX7yykIOOc0zN1zNJxJwOk1qzPULVB89ffmuSuhzu5olYgojy2iEnj70bLY-sEydiIOaTsi7FeUEZW1hbk44iqng", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-13 02:43:15,500:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-13 02:43:15,501:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 13 Sep 2024 00:43:16 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145319296 Replay-Nonce: UAMvsxnwBHwZoKGmN6W1Bu_lTZ8icsG40A0tPit11xgZYG_4-KY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:57:14Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145319296" } 2024-09-13 02:43:15,501:DEBUG:acme.client:Storing nonce: UAMvsxnwBHwZoKGmN6W1Bu_lTZ8icsG40A0tPit11xgZYG_4-KY 2024-09-13 02:43:15,501:DEBUG:acme.client:JWS payload: b'' 2024-09-13 02:43:15,507:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndCSHdab0tHbU42VzFCdV9sVFo4aWNzRzQwQTB0UGl0MTF4Z1pZR180LUtZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMzNjQ2MDYifQ", "signature": "R0Q2vyVc0L5Sr3Xp508togJsCmT1tlj2OGhFAVAR2azvCjFEgJHBR5LqQn3JoBRVXA5290RFFcNnizR0bikCBdEgtROrOHAr1hJcKNlosgSkuH8riuteWZbMammd6A-M1AuQ4ValSkucLHV63DvsDrxAjHmN0u7b_9wdumWCJ6kQe2MreKbpclOLly7mELjM-RejNna3rMnA9GBwpA9xS8XYmYYAStB2BT2CdD0uhXQZPa8TJhSNlHsKaQDE-LuKbREHNvL0pCYOwFRMDBmz0Zu5dYhMIWgU0yB3xvPEu5C75iBPvuks9p5ccrCA6ujipgI7Y4a8sDnKZaj7zE6y-A", "payload": "" } 2024-09-13 02:43:15,660:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123364606 HTTP/1.1" 200 805 2024-09-13 02:43:15,661:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 13 Sep 2024 00:43:16 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnw1ockQroVDXyCOsQyNYTBK9xTVTsR1eEWP2hwxOkpDT0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:57:14Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/ndw7tA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/LOiTWA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/DMnfUA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" } ] } 2024-09-13 02:43:15,661:DEBUG:acme.client:Storing nonce: UAMvsxnw1ockQroVDXyCOsQyNYTBK9xTVTsR1eEWP2hwxOkpDT0 2024-09-13 02:43:15,662:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-13 02:43:15,662:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-09-13 02:43:15,663:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-13 02:43:15,663:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-13 02:43:15,664:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:43:15,664:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-13 02:43:15,664:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-13 02:43:15,664:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-13 02:43:15,665:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-13 02:43:15,666:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-09-13 02:43:15,666:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-09-13 02:43:15,667:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-09-13 02:43:15,668:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)