2024-09-12 14:31:01,347:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-09-12 14:31:01,348:DEBUG:certbot._internal.main:Arguments: [] 2024-09-12 14:31:01,348:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-09-12 14:31:02,071:DEBUG:certbot._internal.log:Root logging level set at 20 2024-09-12 14:31:02,072:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-09-12 14:31:02,109:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-09-12 14:31:02,152:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-12 14:31:02,199:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:31:02,200:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-09-12 14:31:02,204:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-09-12 14:31:02,214:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:13 UTC. 2024-09-12 14:31:02,214:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:31:02,214:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:31:02,220:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:31:02,220:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:31:02,220:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:31:02,242:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:31:02,243:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:31:02,245:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:31:02,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:31:02,738:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:03 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "xgulqw0aJbQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-09-12 14:31:02,738:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:31:08,541:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8458_key-certbot.pem 2024-09-12 14:31:13,941:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8456_csr-certbot.pem 2024-09-12 14:31:13,942:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:31:13,942:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:31:14,100:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:31:14,101:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStKJD1afZvv-9SKv8GeLbCac7ce4gq9vqvpAHYg8eEG7g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:31:14,101:DEBUG:acme.client:Storing nonce: 0Nvv4YStKJD1afZvv-9SKv8GeLbCac7ce4gq9vqvpAHYg8eEG7g 2024-09-12 14:31:14,102:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:31:14,108:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RLSkQxYWZadnYtOVNLdjhHZUxiQ2FjN2NlNGdxOXZxdnBBSFlnOGVFRzdnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cpToppxn81F6K_lmUaQsB0lce5c_l3ml6HensMecRCQw6Hzj1lPKamur2Y-X7kGkfQl22XM829ZGNK9vIKCI9Zi-oJb34BH83VdbZa1KExMUvhCFKAYbGOvwCYq7pbmSggc5n-jJRzuhlQTjpcda4TJOB1zSyIKigc-A9PHwF-bCXbG04O6oprEUF7Zq49ShZeBla3pE_lp9Y8j-pSdToSE6hcC9ksEdFOyL1zKnjcgIGRrsaWc9FxtzqPOQPUpKK6vd-Wj2q4AyBKu-jPXyB6vrPN1Wjnf30pmGRVcTZnMo4smgBi1Y3uOZKZ1n633zCBveRuuD8OEEKM05ELJz_g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-12 14:31:14,313:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-09-12 14:31:14,314:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:31:15 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144772916 Replay-Nonce: UAMvsxnwKEr225lkncu7WHIyl5JDFj3LU7Z7ip6okPx4JD3w-WM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:30Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144772916" } 2024-09-12 14:31:14,314:DEBUG:acme.client:Storing nonce: UAMvsxnwKEr225lkncu7WHIyl5JDFj3LU7Z7ip6okPx4JD3w-WM 2024-09-12 14:31:14,314:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:31:14,320:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndLRXIyMjVsa25jdTdXSEl5bDVKREZqM0xVN1o3aXA2b2tQeDRKRDN3LVdNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI1NDIzMzYifQ", "signature": "WH8YLQRSl-KKsgBzzvyklxe7rXv4LExhRQbI6oKTMvys2koVpLu_HDhslKr78MhJocK6r2Q2WzXCUiGBJ95FX87yoye0ozZi-ASSvk79WTkWiDcbCk7UA2VOcRNX54GAgk2FQwSZGlpAwe8c68vooStV633ILVn8lgRtDBu-xkx5nrwjHbXlq6MfXDG5NvQ2gcBLmDDFIEJyQva5JdYFJhnnN5PLPPEd3-tKARlsHhMZqDJMERMImWQA9mO_NCP5xRtIDdn2QyqHwHOywtWfyIg7jmYjxuo2pO_UXi239ODGYS12ODO9K5i5h0tBgTSm-kY7kUtJyYXnzvKJWjPICg", "payload": "" } 2024-09-12 14:31:14,485:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122542336 HTTP/1.1" 200 810 2024-09-12 14:31:14,494:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:15 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwT71vNe5g_x3ZAYxIENVcFyRaM7snyO6MiRLGCSc3OZ4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:30Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/yxREqg", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/LP3L_w", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/cyyAdg", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" } ] } 2024-09-12 14:31:14,494:DEBUG:acme.client:Storing nonce: UAMvsxnwT71vNe5g_x3ZAYxIENVcFyRaM7snyO6MiRLGCSc3OZ4 2024-09-12 14:31:14,495:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:31:14,495:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-09-12 14:31:14,497:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:31:14,497:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:31:14,500:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:31:14,500:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:31:14,500:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:31:14,501:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:31:14,505:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:31:14,543:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-12 14:31:14,614:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:31:14,615:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-12 14:31:14,616:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-12 14:31:14,621:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:31 UTC. 2024-09-12 14:31:14,621:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:31:14,622:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:31:14,627:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:31:14,627:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:31:14,627:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:31:14,632:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:31:14,633:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:31:14,635:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:31:15,061:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:31:15,062:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:15 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "azxkbLV4bLU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-12 14:31:15,062:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:31:21,606:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8459_key-certbot.pem 2024-09-12 14:31:26,913:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8457_csr-certbot.pem 2024-09-12 14:31:26,914:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:31:26,914:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:31:27,057:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:31:27,057:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQ0UytdVWfDNAOf6gMrw-Za8rZORnYMoHeVCVP2cnEvpw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:31:27,057:DEBUG:acme.client:Storing nonce: fCBw7MtQ0UytdVWfDNAOf6gMrw-Za8rZORnYMoHeVCVP2cnEvpw 2024-09-12 14:31:27,058:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:31:27,063:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFEwVXl0ZFZXZkROQU9mNmdNcnctWmE4clpPUm5ZTW9IZVZDVlAyY25FdnB3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KLssut7-xxiZ14gXi_OEsISdSuesPIuN_3xSfnpAVvXsCalhc9oa65XMlWGlE-jcXHRxcE6H7CiwLHiZ_-ppGilFDBPsJKwKKvi1JSzM_mOdNqEMdYaP-GJ4qeqhpD4C_v7LSmD51_xehqG0MJeMxO8d27pKdaaIyJI-pDFpUQs9tP82DCPOFFsAgBcu3_tk5-w16FSjvaF4oQGo_rve8_kG61NFxs0KWoCvYakN_SspC26V29VWgzeQgz-0GHZJNU50aSx1pP8Nh2BDFAmy_UDy4UfMDI9UsyAn2odbc2dXh9pvmBYcBn4EUmJKnOGbOWpwHlquCQsS3tM_dHkzxQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-12 14:31:27,260:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-09-12 14:31:27,261:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:31:28 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144813576 Replay-Nonce: 4OmWUlyUZIfWoYYGcD7KR7aQukETVSZfHkKS2sYJRyxWNjZdPdw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:43Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144813576" } 2024-09-12 14:31:27,261:DEBUG:acme.client:Storing nonce: 4OmWUlyUZIfWoYYGcD7KR7aQukETVSZfHkKS2sYJRyxWNjZdPdw 2024-09-12 14:31:27,261:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:31:27,267:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVaSWZXb1lZR2NEN0tSN2FRdWtFVFZTWmZIa0tTMnNZSlJ5eFdOalpkUGR3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2MDQxNjYifQ", "signature": "ZO21ZsPimHe7i5GdejltoEUUOvv7CHQ9mdun7JPV3kZcRp_kVYQOkYYCSqpYVunv7fPImWWoZ7cIsOnbp8MpXlGbg5E8Qzjc22xNKyG4eWc4JuskT3iThjuKdPVLa5VhYlJiiARa2GZf1YVcyNX96Sa48jajcYFzHhkxuF6M468DXy7JHciYFzYYOQS48PmLRI_uNJLXdikWRkY1odpu0visceEQDRMbopvydInvxF0P9VQsM-wLysP3g79m5irVWERQ7JCwlyyDroWxzPGGVZSuDXLJfY0rS3QIy5n7YIwfVmwdIREZm_o2TZKPBqoVyBi3oi6Y-R0d8lLqtoU5Dg", "payload": "" } 2024-09-12 14:31:27,433:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122604166 HTTP/1.1" 200 804 2024-09-12 14:31:27,434:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:28 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQlBIeEnaz0mSReVUtBplUvWpZ9GZlHZyYBAoErn5ogAM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:43Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/uKF3Wg", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/osHCwQ", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/ZP8ZRQ", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" } ] } 2024-09-12 14:31:27,434:DEBUG:acme.client:Storing nonce: fCBw7MtQlBIeEnaz0mSReVUtBplUvWpZ9GZlHZyYBAoErn5ogAM 2024-09-12 14:31:27,434:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:31:27,436:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-09-12 14:31:27,436:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:31:27,436:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:31:27,437:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:31:27,437:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:31:27,437:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:31:27,438:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:31:27,439:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:31:27,493:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-12 14:31:27,658:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:31:27,659:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-12 14:31:27,660:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-12 14:31:27,665:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:49 UTC. 2024-09-12 14:31:27,665:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:31:27,665:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:31:27,670:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:31:27,670:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:31:27,671:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:31:27,674:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:31:27,675:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:31:27,677:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:31:28,141:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:31:28,141:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:28 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Wye8GEKWNyw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-12 14:31:28,142:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:31:33,865:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8460_key-certbot.pem 2024-09-12 14:31:39,159:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8458_csr-certbot.pem 2024-09-12 14:31:39,160:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:31:39,160:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:31:39,315:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:31:39,315:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YSt0y4YgOPTGTdYI9S7PE8b5TiSTzOsV88oHBuPiTMplqA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:31:39,315:DEBUG:acme.client:Storing nonce: 0Nvv4YSt0y4YgOPTGTdYI9S7PE8b5TiSTzOsV88oHBuPiTMplqA 2024-09-12 14:31:39,316:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:31:39,321:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3QweTRZZ09QVEdUZFlJOVM3UEU4YjVUaVNUek9zVjg4b0hCdVBpVE1wbHFBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iuG-j92XgwOzgJVR0ByaUqmv_w3VOQbfweaw1gCs3ybefRtv6RuwXbD_yqLcytXDXJ8MgThVH8JXxFBR5rqiPIP80BCZic81FffrIvo5Hg26YCMQD-1QyBnTcwEI71LwmYvIwyri5fZiP1Jlt8ocNKkhB_1zWZX84F5wcN3cd0_MCGBhHa2PKIVdLPgYOKNbCW86UVZa7Ah5lMNtcjlEneT6wBD5xpPiqLCpcQZjz2x9_TRlua7P9lUqN6birw4ubDE6vLL_3IU4f7tRP8SEbR9G_LUcAk-OdkGN-melZDTzqm5w2ugbHJr37ZK2OmydIFtaGAm6k9ivi3ynKcIcBg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-12 14:31:39,503:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-09-12 14:31:39,503:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:31:40 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144849776 Replay-Nonce: UAMvsxnwjoP1qUTh-l6sY55nx3yOdb9pgarUn7RcAp27bycz5ss X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:56Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144849776" } 2024-09-12 14:31:39,504:DEBUG:acme.client:Storing nonce: UAMvsxnwjoP1qUTh-l6sY55nx3yOdb9pgarUn7RcAp27bycz5ss 2024-09-12 14:31:39,504:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:31:39,510:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndqb1AxcVVUaC1sNnNZNTVueDN5T2RiOXBnYXJVbjdSY0FwMjdieWN6NXNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2NTk1OTYifQ", "signature": "wGBiwrDexlm5qGvUhx4BKjaqELpxiTnah3xJi8iPhjW0iSDWc1Gz9ybMq1QdFWsDkIF4iTuOZgu-uC9UVznWKnal1zONIZ0xQpRzgQJlhbdQzYnqIE5Iy3WQdA_cb1b8ttwHWIm_m-QnxojFL1oXN-FnNh7R4DoQz1xXdeKGcN3fIq_Qr7tdiYP-2XLCfO9zQoDtUcpSXqAQm5JHsuX2c07nWfRn1pBzVuKH5ofVGqx11jiUCZpPNiDP_olD2GVXGT4o1BklPfiXesqhJExMaq3AsRk6zIxV14WPgqcecGUaWM2Ov4pZSHrjOhlwItOzSoj6SG8DnZziE-Wz3BMO5Q", "payload": "" } 2024-09-12 14:31:39,670:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122659596 HTTP/1.1" 200 807 2024-09-12 14:31:39,670:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:40 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStf1A-cbOezst9-rWN0egEaVPmam8pc-XHemioVs8crCc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:56Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/2L4MUQ", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/osx5jQ", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/mCb-BA", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" } ] } 2024-09-12 14:31:39,671:DEBUG:acme.client:Storing nonce: 0Nvv4YStf1A-cbOezst9-rWN0egEaVPmam8pc-XHemioVs8crCc 2024-09-12 14:31:39,671:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:31:39,672:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-09-12 14:31:39,672:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:31:39,672:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:31:39,673:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:31:39,673:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:31:39,673:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:31:39,674:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:31:39,675:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:31:39,724:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-12 14:31:39,768:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:31:39,769:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-09-12 14:31:39,770:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-09-12 14:31:39,774:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-09-12 14:31:39,777:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:31:39,816:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-12 14:31:39,845:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:31:39,847:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-12 14:31:39,847:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-12 14:31:39,852:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:07 UTC. 2024-09-12 14:31:39,852:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:31:39,853:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:31:39,859:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:31:39,859:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:31:39,859:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:31:39,864:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:31:39,865:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:31:39,867:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:31:40,344:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:31:40,344:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pYHyo5zrp7o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-12 14:31:40,345:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:31:45,986:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8461_key-certbot.pem 2024-09-12 14:31:51,367:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8459_csr-certbot.pem 2024-09-12 14:31:51,368:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:31:51,368:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:31:51,528:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:31:51,528:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStTSuIaH6VFsfH9uwJNzCC_OwsiEOrM-6H1-ulot7Efak X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:31:51,528:DEBUG:acme.client:Storing nonce: 0Nvv4YStTSuIaH6VFsfH9uwJNzCC_OwsiEOrM-6H1-ulot7Efak 2024-09-12 14:31:51,529:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:31:51,534:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RUU3VJYUg2VkZzZkg5dXdKTnpDQ19Pd3NpRU9yTS02SDEtdWxvdDdFZmFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jhraJf-VlJW-3my8LHkirifatfPjPJr3KDFjJcGscK-WsrRZ14c1gFBftkz0UAH2o1vy_LEIbjyeNApHhWu5wVMhKGdDPG3f3VqeLbVtOxyPT4Ti6dHRF-ot9O10WMlDfzvtVlFsV3vaRKckUm-R2R9eli6bFrA_8hLSf5d5YvNUjfdryQ6UZM8FOOm3jmfhAgBZni6qHh93ynLn7bK9GuOSlqKXyPvPUn7odhigAVSKwJNHjKdtGCd0_C8LjccQ0vvot3sBdD4jdYRxbJNjtn86Cm7bG2ROX1JZh1bWGrSzv4_kng8PP73I6xoxArmbYb2_QqKii67EQQBtfcLW9A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-12 14:31:51,721:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-09-12 14:31:51,722:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:31:52 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144900966 Replay-Nonce: 0Nvv4YStbDqbDcxqdmQwRWEljEcqZ6B0_F0fPS8V7yFM6LOdNWk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:08Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144900966" } 2024-09-12 14:31:51,722:DEBUG:acme.client:Storing nonce: 0Nvv4YStbDqbDcxqdmQwRWEljEcqZ6B0_F0fPS8V7yFM6LOdNWk 2024-09-12 14:31:51,723:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:31:51,728:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RiRHFiRGN4cWRtUXdSV0VsakVjcVo2QjBfRjBmUFM4Vjd5Rk02TE9kTldrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3MjkwODYifQ", "signature": "cJcqxgZpDWGItf8FxOQ3L5fmNpAv8hKCYXrrncvf4O06S18sFGOKAwqMw6OR4k3j3bjd9Ln2fclSGQa8WdlVgfppnfCJHs_0eEkQw1IFwTkv9xwz28O0wZMLMdPqqAqDFO0TW8m8VVcA1_B4bX-S6m4CYyDYhPwJ-linjJ7I03a1R5FD9K2WrJMeLfzC5X470HrwBmCyAEUG6FfJeC4-_5yuD-OUr-ZzJiGnRXoCLlAuHuSdHnFAz_qOqMmKW52QaeESuv-fR5iEFlIpGEJ9X4U2-e0su160YBmqPE6Fdf88fjWs8WRsEUNV8T-Q1JbIMy-F1Z6QH2yoE1oAbdLyUg", "payload": "" } 2024-09-12 14:31:51,904:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122729086 HTTP/1.1" 200 801 2024-09-12 14:31:51,905:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:52 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStEEA6qAqYYxshWnVa1yiEAZlcugJXHVadDfIC70YacsI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:08Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ch6DzQ", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ShHY7A", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/e_W2mQ", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" } ] } 2024-09-12 14:31:51,905:DEBUG:acme.client:Storing nonce: 0Nvv4YStEEA6qAqYYxshWnVa1yiEAZlcugJXHVadDfIC70YacsI 2024-09-12 14:31:51,905:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:31:51,906:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-09-12 14:31:51,906:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:31:51,907:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:31:51,907:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:31:51,907:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:31:51,908:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:31:51,909:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:31:51,910:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:31:51,958:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-12 14:31:51,997:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:31:51,998:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-12 14:31:51,999:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-12 14:31:52,003:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:25 UTC. 2024-09-12 14:31:52,004:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:31:52,004:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:31:52,009:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:31:52,009:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:31:52,009:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:31:52,014:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:31:52,015:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:31:52,017:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:31:52,495:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:31:52,496:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:31:53 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "DotcMomsfZ4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-12 14:31:52,496:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:31:58,082:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8462_key-certbot.pem 2024-09-12 14:32:03,334:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8460_csr-certbot.pem 2024-09-12 14:32:03,335:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:32:03,335:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:32:03,494:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:32:03,495:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:04 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YSt4FesQ6ilWThjiaT2GsCBER1TpEdUrUANVd7Ugcvn2Gw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:32:03,495:DEBUG:acme.client:Storing nonce: 0Nvv4YSt4FesQ6ilWThjiaT2GsCBER1TpEdUrUANVd7Ugcvn2Gw 2024-09-12 14:32:03,495:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:32:03,501:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3Q0RmVzUTZpbFdUaGppYVQyR3NDQkVSMVRwRWRVclVBTlZkN1VnY3ZuMkd3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cacBoC0Lkz4xG42cECtY1dfFDRs7t3nQsOoipQ-zPXJdGPokpvqLOgHvGta7fFhaicXw2D3KeimH0sFHprW65Es-xmtUlzaQwYP9RilVnHKNMn7qjKmWK2H4fHKxja--G65k11ernLRWZVLxsADCfc1o-5JlF3fI7fpMUqIWQi_r-jwDATRWB-OjmlSQRLFJt76UkIUbI7brIi4lOpKt3GQQGMxAQGbFBxcj58Sx5Haa_yBkczcvMQmg5inx_jxWxTRIpeONb4SPDDzWPg4IqSGZSrdIZhEFXzFhWC2gTJSXtc-cmcrm9uSJI1Fkv7X57RCj5v9yymZMZxTTL_F_oQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-12 14:32:03,711:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-12 14:32:03,712:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:32:04 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144940076 Replay-Nonce: UAMvsxnwqk4Tg8X2cqZ1idPPRYUI2FqeVgNjEJLLJSx1CaxQOPE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:20Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144940076" } 2024-09-12 14:32:03,712:DEBUG:acme.client:Storing nonce: UAMvsxnwqk4Tg8X2cqZ1idPPRYUI2FqeVgNjEJLLJSx1CaxQOPE 2024-09-12 14:32:03,712:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:32:03,718:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndxazRUZzhYMmNxWjFpZFBQUllVSTJGcWVWZ05qRUpMTEpTeDFDYXhRT1BFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3OTAxMzYifQ", "signature": "vORSdIcofb6DXCGeYkL_QFlv3eFLDYeK_MBsNYtAJD8qWGfVkf0Gnkpk9j5ELcJGqtncdhfnv0VaH5JdwLGgrszrxCYDyxmSi-RS4OckTH8NuZKsgfaM2gCPObaBDWX_lHH2R-qQB9rhYntSBCTea9cxWNclDuDsX3zdrlO8fDRUFxPjoWGViqbk0F949mokz-Ob_0vbjHpY5Rhb7EqoFB0v2sh-VXhmEeqJvGRkxqzAc312H9LwJzQLzvKozco6xTqH8DbfpDlgZruVnKcpjcYv3h1Am1W5urWWfrRdkQwVa6dVpArsUAn76qRgxhyZY_LB41QIwsVl2Z_GEWiKrg", "payload": "" } 2024-09-12 14:32:03,883:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122790136 HTTP/1.1" 200 805 2024-09-12 14:32:03,884:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:04 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwKY5uraIMWSeiI5TsZ8fUJyrjevvEOZidDVuRy4S8bXQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:20Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/fCm5hA", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/HbiFxg", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/X2nDCw", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" } ] } 2024-09-12 14:32:03,884:DEBUG:acme.client:Storing nonce: UAMvsxnwKY5uraIMWSeiI5TsZ8fUJyrjevvEOZidDVuRy4S8bXQ 2024-09-12 14:32:03,885:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:32:03,885:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-09-12 14:32:03,886:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:32:03,886:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:32:03,887:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:32:03,887:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:32:03,887:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:32:03,888:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:32:03,889:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:32:03,928:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-12 14:32:04,108:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:32:04,109:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-12 14:32:04,109:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-12 14:32:04,114:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:43 UTC. 2024-09-12 14:32:04,114:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:32:04,114:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:32:04,119:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:32:04,119:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:32:04,120:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:32:04,124:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:32:04,125:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:32:04,127:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:32:04,562:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:32:04,563:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:05 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "XIqdmdVmiIA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-12 14:32:04,563:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:32:09,998:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8463_key-certbot.pem 2024-09-12 14:32:15,237:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8461_csr-certbot.pem 2024-09-12 14:32:15,238:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:32:15,238:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:32:15,382:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:32:15,383:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQUwIroE_drAtSS-jkRvQrxO4QwpjaP26whg1NKq3EqQU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:32:15,383:DEBUG:acme.client:Storing nonce: fCBw7MtQUwIroE_drAtSS-jkRvQrxO4QwpjaP26whg1NKq3EqQU 2024-09-12 14:32:15,383:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:32:15,390:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFVd0lyb0VfZHJBdFNTLWprUnZRcnhPNFF3cGphUDI2d2hnMU5LcTNFcVFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "bMVqGJW3ueanZr3ZjGVUxjaUO0RN5SmMM7OFMvpCm3WErloxf_pBJDd24DSK4gg1zFxo8ykeVLnuC46QYSeHrmKZTRbt6BhDRFnmXnofUEy0UF8GifYDH1peSl9yLbaG1Tv8HyvRgzcar-5tR2SMQYAH1VptIjdfqVueN1OYHYn_KJn8QKW-CVcCQ5Z-yAAXcgY4bXIRG2iqmGkCGTMwsocmrM5EN9e4I2UptPHx_s5col3GGbCNcImrIAg1OCLAtKxqP8sZKIFNigSAP9tnxxS1P-27hQzP9Hbu1i-T0zELjN3O3fQ2ni0N3n90HHi-Syw8gbYK91UB4vnLKPRsPw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-12 14:32:15,595:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-09-12 14:32:15,595:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:32:16 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144979426 Replay-Nonce: 4OmWUlyUqZjR2S4Bb29e7v9qHXFN2sraXJ-J0S6Ta1OQWgAc9Cg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:33Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144979426" } 2024-09-12 14:32:15,596:DEBUG:acme.client:Storing nonce: 4OmWUlyUqZjR2S4Bb29e7v9qHXFN2sraXJ-J0S6Ta1OQWgAc9Cg 2024-09-12 14:32:15,596:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:32:15,602:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVxWmpSMlM0QmIyOWU3djlxSFhGTjJzcmFYSi1KMFM2VGExT1FXZ0FjOUNnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI4NTExMzYifQ", "signature": "N0_I5X_GSnx8ATxccv4eQC2ff42Q7bGiYSTThFyijJBMG2IMqa9RPXk6SacqxXzuvCbX6CPeqS2cdsCjkUdbDxTAfmIbsZxWun3dKDOfNGxS3xY7mr8VVNQ-8XT5mZhxAVt4nCwXFzan1GbeBZOCWp_Mmz2Zt_GAtGZVOXXXhq_e1sOrkr3KiaF0317xn6VSjaxQFTD7-1AKUI0fnAyfE1xw6Y1IjzWRwbqmP-wcd0N1Z09U3T_eU5eRsCbtwyTFDEVd2V---Ff6yMoTAyaC81Z2mebP1-_EcAENTRgK_7LKRUl6cGhlHJJCYgWkOZIDrhkydWlytOoXXI4SNurtvA", "payload": "" } 2024-09-12 14:32:15,765:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122851136 HTTP/1.1" 200 809 2024-09-12 14:32:15,766:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:16 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUBT5i9REClGK_vVZ-tvNY3oGq6mPJql2KaJUf19b3HkA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:33Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/nTAn0w", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/Kdwo9g", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/kuyLHA", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" } ] } 2024-09-12 14:32:15,766:DEBUG:acme.client:Storing nonce: 4OmWUlyUBT5i9REClGK_vVZ-tvNY3oGq6mPJql2KaJUf19b3HkA 2024-09-12 14:32:15,768:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:32:15,768:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-09-12 14:32:15,769:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:32:15,769:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:32:15,770:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:32:15,770:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:32:15,770:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:32:15,770:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:32:15,772:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:32:15,816:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-12 14:32:15,887:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:32:15,888:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-09-12 14:32:15,889:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-09-12 14:32:15,893:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:14 UTC. 2024-09-12 14:32:15,893:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:32:15,893:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:32:15,898:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:32:15,898:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:32:15,899:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:32:15,903:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:32:15,904:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:32:15,906:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:32:16,383:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:32:16,384:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:17 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "C8gZ9kFWcHs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-12 14:32:16,384:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:32:21,840:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8464_key-certbot.pem 2024-09-12 14:32:27,084:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8462_csr-certbot.pem 2024-09-12 14:32:27,085:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:32:27,085:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:32:27,245:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:32:27,246:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwjmufRyYbsEDkzkBoiN3ArAsVpE48KWKb2t26cXJYWY0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:32:27,246:DEBUG:acme.client:Storing nonce: UAMvsxnwjmufRyYbsEDkzkBoiN3ArAsVpE48KWKb2t26cXJYWY0 2024-09-12 14:32:27,246:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:32:27,252:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndqbXVmUnlZYnNFRGt6a0JvaU4zQXJBc1ZwRTQ4S1dLYjJ0MjZjWEpZV1kwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xkeJMY_rW4RKYKzqXESjx9p0GqWCfS7rEn7AJzj3g0Zi9u6QI0WxcsMVtdrCVCsOjT-xqGy7joMCYdYTRhxKJlokdY7Af79dzWPVJWu5XyDcsrQhvXr5fjhKjkoKUifDQopIJ84DlMzG5_qfQuubhx0RXjEHkdGiii8kSZGfCK_X2BWTuGHJbfs9FSRRBwZnOG9vY5duvY61oxN-G-Yuq4iRvbsDjvdpYFYURZIgmENYVjfV7WWB2Xoz14rjA_ghpBL2d4nda6ck7jrAkjSzCFpeM57omJKbO2EjD7_JbEFFO5UzVSSG8L4jevfDPe_JtWNLT_9poIcNPJqfGBTDuw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-12 14:32:27,440:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-09-12 14:32:27,441:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:32:28 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145018096 Replay-Nonce: UAMvsxnwu1uva-alUfaIOuhZhnRxXhRiYpMLiLNuW9c4xwWjMYk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:45Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145018096" } 2024-09-12 14:32:27,441:DEBUG:acme.client:Storing nonce: UAMvsxnwu1uva-alUfaIOuhZhnRxXhRiYpMLiLNuW9c4xwWjMYk 2024-09-12 14:32:27,441:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:32:27,447:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bnd1MXV2YS1hbFVmYUlPdWhaaG5SeFhoUmlZcE1MaUxOdVc5YzR4d1dqTVlrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5MTA5OTYifQ", "signature": "RDfU_j5CVEWjqPqPMbKCHM3nezimBP81wl-BJNSHEVVhaqqU2WOxNhoLAjLe6ecQvMjTcza2hrEQCwvI7S0KLFIBid9-nbOVvCR3T5XcmZVor1gWCB29teUr6WkdS-J4s1r5ICfwVOsX3Fd4fxRw9O_VgObTCPFJ4qn_dM2rytkJBV34t1uNfqPpFUqSz3VRvexh-V8gqgSuoGucKtOrmSAqjAuHepjiwuUXP2heXeQ7UVP9CVf7yonavJyQF7YksKy7iZDNHYQOmutixwHeyBeIXx1j5jJCf68CZzY312Z4f9WQRCL6qQZNQ5ykiR0t7navCzKxEeicxa2G94URWw", "payload": "" } 2024-09-12 14:32:27,627:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122910996 HTTP/1.1" 200 807 2024-09-12 14:32:27,628:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:28 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwyb2-XmWVQsncta_tKYLF3JoK335fbwymN-7mK6nr-eA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:45Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/QNmv8g", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/4_hHkg", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/Xg0Zog", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" } ] } 2024-09-12 14:32:27,628:DEBUG:acme.client:Storing nonce: UAMvsxnwyb2-XmWVQsncta_tKYLF3JoK335fbwymN-7mK6nr-eA 2024-09-12 14:32:27,630:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:32:27,630:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-09-12 14:32:27,630:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:32:27,631:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:32:27,631:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:32:27,632:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:32:27,632:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:32:27,632:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:32:27,634:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:32:27,681:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-12 14:32:27,789:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:32:27,790:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-12 14:32:27,791:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-12 14:32:27,795:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:33 UTC. 2024-09-12 14:32:27,796:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:32:27,796:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:32:27,801:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:32:27,801:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:32:27,801:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:32:27,806:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:32:27,806:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:32:27,808:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:32:28,239:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:32:28,240:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "edAPnIfFEqE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-12 14:32:28,240:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:32:33,582:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8465_key-certbot.pem 2024-09-12 14:32:38,849:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8463_csr-certbot.pem 2024-09-12 14:32:38,850:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:32:38,850:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:32:38,994:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:32:39,001:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUpY15qdulgZBZPGoIIEiRJ6ewbawi2Mf0h4KGl75mkhM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:32:39,001:DEBUG:acme.client:Storing nonce: 4OmWUlyUpY15qdulgZBZPGoIIEiRJ6ewbawi2Mf0h4KGl75mkhM 2024-09-12 14:32:39,001:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:32:39,007:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVwWTE1cWR1bGdaQlpQR29JSUVpUko2ZXdiYXdpMk1mMGg0S0dsNzVta2hNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EaPJ1UWZMmuPkvm0BgHIP0wQ5EbDiEncNv8R7-3jlIk_I-WtG8Za7SyermCE87k-gkmfEweCij_JGeJwY100H6b5WVKFrPm0tYxzy0cpqMECLWlLolSU3PARerCcNbu_4DmO-ulcgFARAZEskllZujFtwDlCbg84rlnJZwZqn2kq3pgT1mlNpUUzCMi69MUH8RJpugVhFPigDg-6p_NRolrqJCpOtltJ4isnmb3u2RLCf-Ky4UpvBqtQa13jBYa-_oBaFScAZ2i6zvicfO5fJN48bklaja8KQCAsHQQPtJ3T4ll-v80hLwtZoU-oHIaSm4cH7yuNdpuxudeEfnsw6g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-12 14:32:39,169:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-09-12 14:32:39,170:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:32:40 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145056036 Replay-Nonce: fCBw7MtQ38INJ65qkv32FC3_r6Yh3As8TE7ETUBjl-MJ8EN4rBE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:58Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145056036" } 2024-09-12 14:32:39,170:DEBUG:acme.client:Storing nonce: fCBw7MtQ38INJ65qkv32FC3_r6Yh3As8TE7ETUBjl-MJ8EN4rBE 2024-09-12 14:32:39,171:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:32:39,176:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFEzOElOSjY1cWt2MzJGQzNfcjZZaDNBczhURTdFVFVCamwtTUo4RU40ckJFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5NjY5OTYifQ", "signature": "XNWf-BTzQjBbamyEooG_e8NXplN2njYYH6RXrQBK4qXZH_r5bP_K9bwqC2KQ06Z0jurnR3V13dnV4UfP8_SNaeB5a5r1tR4Fbngc7OZtYSDOGvVBHCr01CNK4z7UzCn4SMtbbdZVVJ2L8SCqARbxfnUr17uvhDM3sA1cSx0ci9ImXsxK_PuQu3yS61lMH8STV9gxg1hQCPfQ5aL45-pd4Ta3vzxNRj-M4-s90DfOGAznn07XAvolG8VCBmhGzGDHLFDUVegf_VIapPOpTjCmBLO7hvqg_Ur1CKXdOKGOkXI6rSfVkT0HrNIvNxFz9phqktEpAKv3Bbp-5R8DNKIdNA", "payload": "" } 2024-09-12 14:32:39,340:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122966996 HTTP/1.1" 200 806 2024-09-12 14:32:39,342:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:40 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQZSWamvoGr5Xyh31erzSnSlB-S94JKrQ59hmqU2dgPao X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:58Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/9cCtaA", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/RuQu8g", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/lsTunA", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" } ] } 2024-09-12 14:32:39,342:DEBUG:acme.client:Storing nonce: fCBw7MtQZSWamvoGr5Xyh31erzSnSlB-S94JKrQ59hmqU2dgPao 2024-09-12 14:32:39,344:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:32:39,344:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-09-12 14:32:39,344:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:32:39,345:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:32:39,345:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:32:39,346:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:32:39,346:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:32:39,346:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:32:39,347:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:32:39,395:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-09-12 14:32:39,396:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:32:39,396:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-09-12 14:32:39,402:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-09-12 14:32:39,404:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-09-12 14:32:39,404:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-09-12 14:32:39,404:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-09-12 14:32:39,405:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-09-12 14:32:39,406:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-09-12 14:32:39,447:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-12 14:32:39,492:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:32:39,493:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-12 14:32:39,493:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-12 14:32:39,498:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:53 UTC. 2024-09-12 14:32:39,498:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:32:39,499:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:32:39,504:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:32:39,504:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:32:39,505:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:32:39,509:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:32:39,510:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:32:39,512:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:32:39,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:32:39,977:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:40 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "sZ2yuUOD57g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-09-12 14:32:39,978:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:32:45,714:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8466_key-certbot.pem 2024-09-12 14:32:50,953:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8464_csr-certbot.pem 2024-09-12 14:32:50,954:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:32:50,954:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:32:51,109:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:32:51,114:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStNTNKPqESwJ0s5d_8SIb0yqjxYTnLM1oka2LMtI-jbmo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:32:51,116:DEBUG:acme.client:Storing nonce: 0Nvv4YStNTNKPqESwJ0s5d_8SIb0yqjxYTnLM1oka2LMtI-jbmo 2024-09-12 14:32:51,119:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:32:51,126:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3ROVE5LUHFFU3dKMHM1ZF84U0liMHlxanhZVG5MTTFva2EyTE10SS1qYm1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jeDVah7zPVlHGTKopAjw7nsZV9jGfwiAwpp1Nppzov1EVbbY2n3n8uxrgxNAdqsxDUA_vrNwjtpoIG6PJN9hdpoQhiK8cqZJq9o7G94zhfSaO3LUBLog_m8xTfhlxKPgZQ01tVcMH4ffdVRDNfmuNLdKVtjAoxjLAs5aOQ2-wzwC16uErhQc9MOIQMksd85vVQWI9JSmzeHayGmsmIHQDu4P-CO9THE54DOEv7YaEBdJ6GuQZrBkwKmj89W-9XVQ7-R48ekhJIwmhWbZ0njuLd4DejPDD-Gid1a2rXC3ClVrsTPCerakuUMeBBRkf-7kXF_KXvbzlDJxaM6cejvV2w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-12 14:32:51,307:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-09-12 14:32:51,308:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:32:52 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145110166 Replay-Nonce: 0Nvv4YStXjy9AYbjj6vvtqM8jd6cNlzkaHklkJBK85JqZE-ekTc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:11Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145110166" } 2024-09-12 14:32:51,308:DEBUG:acme.client:Storing nonce: 0Nvv4YStXjy9AYbjj6vvtqM8jd6cNlzkaHklkJBK85JqZE-ekTc 2024-09-12 14:32:51,308:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:32:51,314:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RYank5QVliamo2dnZ0cU04amQ2Y05semthSGtsa0pCSzg1SnFaRS1la1RjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMwNDM0ODYifQ", "signature": "u9rXGkoMcPI0gRLZFSmQwwbw1dUuBHOW0_xJK3TFxFGV5EnQ3dfLPIbnX_CpBvM1YnPuHGlDc5EI4Whyz5ZFGpc4xU2By6ftmcI8fAvy7KbUciWCEQhVvHyZvKBBtNnvEPgQcC-FnBloBJ6wpw1017E-j7xeZmuDVTXBou1UxH100JBS1b9MvHr0BijUOTNqJVfc0iRuAiMt_rdIoxL88h8n7xp3BYXlryXZy8jsp4FY7FlSyl3opG5sC4uvzTc2OdAaXYjTJVaELbaAUVmaD8uliHulS0oRRKEyFK2abuQ_isDbrRCGg_EVGykxu3r2H4HlDOkHUmyE888oeOd7Fg", "payload": "" } 2024-09-12 14:32:51,472:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123043486 HTTP/1.1" 200 811 2024-09-12 14:32:51,473:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:52 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwpWv_pl2bVf9dziEaGn687ecslHxlcthP3UWQnBA5QC4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:11Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/oHWByA", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/6UDG0g", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/5SnKCA", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" } ] } 2024-09-12 14:32:51,473:DEBUG:acme.client:Storing nonce: UAMvsxnwpWv_pl2bVf9dziEaGn687ecslHxlcthP3UWQnBA5QC4 2024-09-12 14:32:51,473:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:32:51,474:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-09-12 14:32:51,474:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:32:51,475:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:32:51,475:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:32:51,476:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:32:51,476:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:32:51,476:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:32:51,477:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:32:51,517:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-12 14:32:51,639:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:32:51,640:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-12 14:32:51,641:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-12 14:32:51,645:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:20 UTC. 2024-09-12 14:32:51,646:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:32:51,646:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:32:51,651:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:32:51,651:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:32:51,651:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:32:51,656:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:32:51,657:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:32:51,659:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:32:52,099:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:32:52,100:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:32:52 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "wG7wn038XAE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-09-12 14:32:52,100:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:32:57,561:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8467_key-certbot.pem 2024-09-12 14:33:02,838:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8465_csr-certbot.pem 2024-09-12 14:33:02,838:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:33:02,839:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:33:02,986:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:33:02,987:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUNITm0Hx4WwnxB14TyLulrRlE8_eZD4SEkQFtK1LdbXc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:33:02,987:DEBUG:acme.client:Storing nonce: 4OmWUlyUNITm0Hx4WwnxB14TyLulrRlE8_eZD4SEkQFtK1LdbXc 2024-09-12 14:33:02,987:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:33:02,994:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVOSVRtMEh4NFd3bnhCMTRUeUx1bHJSbEU4X2VaRDRTRWtRRnRLMUxkYlhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cIbdhJ5i4e502Ugy8Qi2Jhsnd-869g6hfseCdsTS3OqyZE5sxkQrlNYIJ8uXmHf5skN-sikfKckNwiLEqTvgFjc1BIAvt_D_d7kGqORZ8YSmqut0M_uiGL5vZ7qpr3XWghxKj-PxoHHLdnhvRjP0NyjjHe_7bQdQyUiSu6Fb_Oo75itfdULdOx27d3a9HQusw3j8E4lhlS1Dp9VM_frpRabAyF_1vSUnuLnih8S6O19EbBOxXyrsO_cWlLJhU_varLxunGiT8neCEKEReZqyK2oL6bWAd-Ih-g5jbUwtfPcUg0Q5iz2QtVM-y9Of6mkSB4JwXWlG_fWLmAttefazmg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-12 14:33:03,182:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-09-12 14:33:03,183:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:33:04 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145156016 Replay-Nonce: 4OmWUlyU5zgfyUix_lZxKx3u1AdDeMd-Sky_GAJ5VVCw-puh9WU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:24Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145156016" } 2024-09-12 14:33:03,183:DEBUG:acme.client:Storing nonce: 4OmWUlyU5zgfyUix_lZxKx3u1AdDeMd-Sky_GAJ5VVCw-puh9WU 2024-09-12 14:33:03,183:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:33:03,189:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVU1emdmeVVpeF9sWnhLeDN1MUFkRGVNZC1Ta3lfR0FKNVZWQ3ctcHVoOVdVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxMTQzNjYifQ", "signature": "fqIXzJn05k437yRxMcZGXegMG1vSEjL0WKSQeylr0iRBuqPe8OrcKO-jXzjt-Bp1e6BkUmYou8BKPoo6_t_C7ASTqeJ8gUr8yVwHmhr7OLhWqh_8YPfGLa51rJYRRmb7rR2lxsrWTTpZFIjmSFJjk8ereGwxxXkpuQ9ZZPdYtrU5fioD_Ei6L-W_qoqsWBMzmMtbF1GTZMinsKUqth8EEzzoYFiG6BprqVFXLuaSDLY8GlsKsRVz2plRZ-snz3cfnXgWNFEGZChe5gjbL3jiRNWoabrU8NZHUKpiZLy-rNhnZLdOuWqaAKiXxyU_JSmmqDqHJwfHCQM0pMqow3GL6Q", "payload": "" } 2024-09-12 14:33:03,361:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123114366 HTTP/1.1" 200 810 2024-09-12 14:33:03,361:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:04 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQo0FgQRzEuzt1Wb_THGsMY_4XI44er12qkftgsLatFvA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:24Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/hpZofw", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/0k48SQ", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/K6FLfA", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" } ] } 2024-09-12 14:33:03,361:DEBUG:acme.client:Storing nonce: fCBw7MtQo0FgQRzEuzt1Wb_THGsMY_4XI44er12qkftgsLatFvA 2024-09-12 14:33:03,362:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:33:03,362:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-09-12 14:33:03,363:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:33:03,363:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:33:03,364:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:33:03,364:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:33:03,364:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:33:03,365:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:33:03,366:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:33:03,412:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-12 14:33:03,608:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:33:03,609:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-09-12 14:33:03,610:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-09-12 14:33:03,614:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:39 UTC. 2024-09-12 14:33:03,614:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:33:03,615:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:33:03,620:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:33:03,620:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:33:03,620:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:33:03,625:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:33:03,625:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:33:03,627:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:33:04,074:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:33:04,075:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:04 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TDk9CFkGdno": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-12 14:33:04,075:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:33:09,530:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8468_key-certbot.pem 2024-09-12 14:33:14,780:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8466_csr-certbot.pem 2024-09-12 14:33:14,781:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:33:14,781:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:33:14,927:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:33:14,928:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQP59khS_xsQOzrj3BQkjjee-RcaT0xxDuf8FfN0zw7nE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:33:14,928:DEBUG:acme.client:Storing nonce: fCBw7MtQP59khS_xsQOzrj3BQkjjee-RcaT0xxDuf8FfN0zw7nE 2024-09-12 14:33:14,929:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:33:14,935:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFQNTlraFNfeHNRT3pyajNCUWtqamVlLVJjYVQweHhEdWY4RmZOMHp3N25FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "q11Kf4ABZvoRSUJMHARmCa-4lAzdsuoC7flXMdesypdJqoesqjB9oabx3PnhIhfmtSavVJkSAWKMkPNl7RGHHb1BjFmQH340eKoUg-J2X11oYCQkRR2ypMA4SOEjeuJAtjkqHAKFqVBZRJvzN77tGJQZ3AxAUJ3NZD7KUJQROZBXO0h6b5n_VpSSJb6f7G35gRlibj7JVWzpQd6B0X6DrnKS9mPnJ6GYJBYm9OBBNa288GAM54rs1onEAPbgTLDa_xmmzvxOZIsiRZ-1wAzJlI6BjFa9_qv0Q5ROfdxWuu4Lyf5QeeJY5zkXuWEkyBO1bk4CatGIYB5UFUyRBjbFjQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-12 14:33:15,161:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-09-12 14:33:15,162:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:33:16 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145193816 Replay-Nonce: fCBw7MtQJUXylHvQhOOC5F9nZMSmuQQPA7PuWsb9YUXdjdRZolw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:37Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145193816" } 2024-09-12 14:33:15,162:DEBUG:acme.client:Storing nonce: fCBw7MtQJUXylHvQhOOC5F9nZMSmuQQPA7PuWsb9YUXdjdRZolw 2024-09-12 14:33:15,162:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:33:15,168:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFKVVh5bEh2UWhPT0M1RjluWk1TbXVRUVBBN1B1V3NiOVlVWGRqZFJab2x3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxNzMyODYifQ", "signature": "ySZEf2SNNsIXb0PS1fmHhJRZXVZ27dGbIexvO_ZONCeVotHKYQ8tUa6JqxBUm0QTfGLS1rWDwQQ9zdeM8lGDFm4VHZVh-iHf1iLjT5_15g3a6VgbbgrPlAGcUYpsKueroDokTvpS4xXMcskY9HYIY3p3FC67abyOAeXvADFrHjhpr95ZPBkK88sLqfVLXhMf1Hk_j7AweAfhIUUyVnNd42E5bJChGAWTqwEXgzcgqtTxRtmM_RlU1Uu7yVLASQ9dFAYBrgXni9qtpKG6789nTfkqcO4qFW8w2m9lVUmP7N2l7UJAwAgKEkTNU9fMLgFJV4BedwY7sGapHOiqcH6eOw", "payload": "" } 2024-09-12 14:33:15,334:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123173286 HTTP/1.1" 200 809 2024-09-12 14:33:15,335:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:16 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQwCQCWOsxXYCB7mAd29xydxqqhKI4jTcI99357TkVo-E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:37Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/S6yiLg", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/QeJIqg", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/xZ9qpw", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" } ] } 2024-09-12 14:33:15,335:DEBUG:acme.client:Storing nonce: fCBw7MtQwCQCWOsxXYCB7mAd29xydxqqhKI4jTcI99357TkVo-E 2024-09-12 14:33:15,335:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:33:15,336:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-09-12 14:33:15,336:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:33:15,336:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:33:15,337:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:33:15,337:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:33:15,337:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:33:15,338:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:33:15,339:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:33:15,379:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-12 14:33:15,556:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:33:15,558:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-09-12 14:33:15,558:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-09-12 14:33:15,563:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:57 UTC. 2024-09-12 14:33:15,563:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:33:15,564:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:33:15,569:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:33:15,570:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:33:15,570:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:33:15,574:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:33:15,575:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:33:15,578:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:33:16,010:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:33:16,010:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:16 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "AlwaRzGj2Oo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-12 14:33:16,011:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:33:21,576:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8469_key-certbot.pem 2024-09-12 14:33:26,962:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8467_csr-certbot.pem 2024-09-12 14:33:26,962:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:33:26,962:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:33:27,104:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:33:27,104:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUlDLjpYWYVNv8bdqFvkWIPaKl8rbAtx0-JP5hBdQxEWk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:33:27,104:DEBUG:acme.client:Storing nonce: 4OmWUlyUlDLjpYWYVNv8bdqFvkWIPaKl8rbAtx0-JP5hBdQxEWk 2024-09-12 14:33:27,105:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:33:27,111:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVsRExqcFlXWVZOdjhiZHFGdmtXSVBhS2w4cmJBdHgwLUpQNWhCZFF4RVdrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Civzgri5-YZIhipJbLfnczhtmp5-YkqZE576sYAxnuF1BcwxplzSPJ5RvBtJXM7J91Iy2ONDIfrS0aq4a43GzKRzSl3X3hFcLKZZRH_8xJg6A4KLCFCvCXXNmr6tnuH5Gu7DEwsDD_RHuTOwpajFEcDLnPseAd5N80ViBBNSNuy5-0ziSWqEMUaz2yrk34HNdt_8MpyPdgKwu8PC6DVfAez3DzRqPcPNkZDV7RVIJGMmYUOSGBkMtOMQYEIsiR7mN7jkgphqAlbTxZJSIaOudC4pnjH2sJD3OQ358TMDy4lb0Bq9mup3lo778N2vUpd6d5mUDqxVKLuC11z_KSJGFQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-12 14:33:27,296:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-12 14:33:27,297:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:33:28 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145229456 Replay-Nonce: fCBw7MtQm0z07H5FYppR3paXb50EMgZor8PU6kokRXKpXm2h1_I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:49Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145229456" } 2024-09-12 14:33:27,297:DEBUG:acme.client:Storing nonce: fCBw7MtQm0z07H5FYppR3paXb50EMgZor8PU6kokRXKpXm2h1_I 2024-09-12 14:33:27,298:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:33:27,303:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFtMHowN0g1RllwcFIzcGFYYjUwRU1nWm9yOFBVNmtva1JYS3BYbTJoMV9JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyMjk1MDYifQ", "signature": "L7lDd2UPHB8rXskWKZBTstx0p-bIeuTZQJTLg_LTtmnG8zqYNB4IgWzdBBrtqbfNhAV01nr0QYkuenB5tHhjLp_rjNaxghp9CP9lGdyTCzYA1o_mWv_D_zDsmM3yyBig-sI4F9kB98U4b2dlKIEqQgcxtNGynBJar0kY7Z5Vy4belMEP8FTnt16ggh4VEd2GMESLZaka6o4zCOLrTB4xnOAv9tzL2aLkum1lvvt3gHwmB4pPDSNYfWN5wCZOAGUU5GnMP9MjHxjdlSi_66eiRQgK_3s7iOWcql8yJlvhFrrGBkR1lSAIhmXHUxpSsFglP9KuzDSwU7FU0BGSySNbsg", "payload": "" } 2024-09-12 14:33:27,463:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123229506 HTTP/1.1" 200 805 2024-09-12 14:33:27,464:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:28 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUXZ2bYj8cwq1-pN8fPTuR0TnVq_Pfug9UQBZVRf3j_Ds X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:49Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/gbt7DA", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/K5UDEQ", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/yzBBsQ", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" } ] } 2024-09-12 14:33:27,464:DEBUG:acme.client:Storing nonce: 4OmWUlyUXZ2bYj8cwq1-pN8fPTuR0TnVq_Pfug9UQBZVRf3j_Ds 2024-09-12 14:33:27,465:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:33:27,465:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-09-12 14:33:27,466:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:33:27,466:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:33:27,467:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:33:27,467:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:33:27,467:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:33:27,468:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:33:27,469:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:33:27,516:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-12 14:33:27,732:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:33:27,733:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-12 14:33:27,733:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-12 14:33:27,738:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:15 UTC. 2024-09-12 14:33:27,738:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:33:27,738:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:33:27,743:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:33:27,743:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:33:27,744:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:33:27,748:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:33:27,749:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:33:27,751:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:33:28,238:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:33:28,238:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "XO9lbLLEQ-M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-12 14:33:28,239:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:33:33,788:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8470_key-certbot.pem 2024-09-12 14:33:39,109:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8468_csr-certbot.pem 2024-09-12 14:33:39,110:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:33:39,110:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:33:39,267:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:33:39,268:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStVQdnuoVJXYsBKsBv3rmg4uxWAdmMehADRO6_59gYgxY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:33:39,268:DEBUG:acme.client:Storing nonce: 0Nvv4YStVQdnuoVJXYsBKsBv3rmg4uxWAdmMehADRO6_59gYgxY 2024-09-12 14:33:39,269:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:33:39,276:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RWUWRudW9WSlhZc0JLc0J2M3JtZzR1eFdBZG1NZWhBRFJPNl81OWdZZ3hZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KZqtnftEghuS_XxpFPMhfsknaE0EPnb50rtUr1ATJzDU0aO25bO_5xV5JYSFoHUlULj0kw1MegrYffB2qM5ULfYyZM8Q2DZLrtepkm73nvkgXJjHRnllu5zUcolZetUZZFEONa5fAGglLLsjOe6Y30tGtmOjX6y5QZXZ2-DnqY3vZqCVG1qKvmQRgY4_eHdZyoTs3JoylbZ76qMMYFaLmWap64GlK3qEWcmh7ximrsJB7ATldudEtpOKF0eYpp_enrfJSpDq3kHRUHDlm-VzCjsrWSEd-jz_Z7buDisKkst2HiVxW23sjkZCdy2yEuOF5Mx2rKqxyYmbVZ6XjHUejQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-12 14:33:39,458:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-12 14:33:39,459:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:33:40 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145265276 Replay-Nonce: 0Nvv4YStaBiyksw39oRdW3jkMdqh8mSWVgmYHH5Q_spJOQUCFdU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:57:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145265276" } 2024-09-12 14:33:39,459:DEBUG:acme.client:Storing nonce: 0Nvv4YStaBiyksw39oRdW3jkMdqh8mSWVgmYHH5Q_spJOQUCFdU 2024-09-12 14:33:39,459:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:33:39,465:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RhQml5a3N3MzlvUmRXM2prTWRxaDhtU1dWZ21ZSEg1UV9zcEpPUVVDRmRVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyODY1ODYifQ", "signature": "w6LITMhZT7EFMVmW2ckuWnzMGNSaqfvBCusiWBgh9IIStmYFZyEPwDM_oT1s1iRgZLHT7qmbBZyLUPGrMpdbPTA1kt0L2zolgJY26Uy4OFNyDLZUWakoQ3EmcBEau2H8r-jPeWQQKs5eZROUo7VV8wOSXVZR_FsnoiLFI23E3GPHXemYwHHzdAidBrN0qYvvJrAfGz9Iv2dK2pWcw_xqJiCfniI4T4wQZl7JNnG7kekaGYDT-KHLV7d1XIHbqZP9xBCPXbkjPxL-1ttAz3ELLZ3ar8-pnjjngYLIoIE1t1khCqiPoABX37JmlH3l2w8n7ls5bHzMnKlbBUPul2TQPQ", "payload": "" } 2024-09-12 14:33:39,630:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123286586 HTTP/1.1" 200 805 2024-09-12 14:33:39,631:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:40 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwJYzNXqD2tHvroXztN-yzdBTGhPJO6lm1nyi_mfpplNQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:57:01Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/B20YQg", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/S9gNtg", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/dinKKw", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" } ] } 2024-09-12 14:33:39,631:DEBUG:acme.client:Storing nonce: UAMvsxnwJYzNXqD2tHvroXztN-yzdBTGhPJO6lm1nyi_mfpplNQ 2024-09-12 14:33:39,632:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:33:39,632:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-09-12 14:33:39,632:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:33:39,633:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:33:39,633:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:33:39,634:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:33:39,634:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:33:39,634:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:33:39,635:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:33:39,682:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-12 14:33:39,889:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-12 14:33:39,891:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-12 14:33:39,891:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-12 14:33:39,896:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:30 UTC. 2024-09-12 14:33:39,896:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-12 14:33:39,896:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-12 14:33:39,901:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-12 14:33:39,902:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-12 14:33:39,902:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-12 14:33:39,906:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-12 14:33:39,907:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-12 14:33:39,909:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-12 14:33:40,336:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-12 14:33:40,337:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Wu7jjxfWyV4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-12 14:33:40,337:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-12 14:33:45,890:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8471_key-certbot.pem 2024-09-12 14:33:51,321:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8469_csr-certbot.pem 2024-09-12 14:33:51,322:DEBUG:acme.client:Requesting fresh nonce 2024-09-12 14:33:51,322:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-12 14:33:51,464:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-12 14:33:51,465:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUSxZCjPmKSXdCBeEMmxX2CBYUnsUt6wd5SyXOBX2v6DQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-12 14:33:51,465:DEBUG:acme.client:Storing nonce: 4OmWUlyUSxZCjPmKSXdCBeEMmxX2CBYUnsUt6wd5SyXOBX2v6DQ 2024-09-12 14:33:51,465:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-09-12 14:33:51,471:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVTeFpDalBtS1NYZENCZUVNbXhYMkNCWVVuc1V0NndkNVN5WE9CWDJ2NkRRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YMjKk8saQbPDbxndJK90ik9MAnEaVkDraCQcxwEcjpz2lUcX06fC0w6WgEztA92Rz8DFJmem4jLM3K5OlDRKni3o2fGz2gDsGtfUX4_I7x__WwZEdfePY5E_T1CqAVn6JeNOYS40Kj5W6BBfWb8yVZ4ZZ8KQqPzwQIllwOU3UlYDvXhy5zN-5lOKXk6jOVlRRjTboEo-REMh0beyZBPaVl3AAG94HxxRdy0-37-7PMtIVVlXfg4aA7j2KkZLpN55lsaT1uQex3PNalx3g7-TiPeYLE1mVV0AxnPXuQgXfPDeV6TPZhOxzRAA6f2hlKHSAg26IM7XLRcI0u2FYiQGGg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-12 14:33:51,665:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-12 14:33:51,666:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 12 Sep 2024 12:33:52 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145319296 Replay-Nonce: fCBw7MtQgb_Nb719NX3yOdQo0GNKnDxT2ejVygK9XkC5AvIcxas X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:57:14Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145319296" } 2024-09-12 14:33:51,666:DEBUG:acme.client:Storing nonce: fCBw7MtQgb_Nb719NX3yOdQo0GNKnDxT2ejVygK9XkC5AvIcxas 2024-09-12 14:33:51,666:DEBUG:acme.client:JWS payload: b'' 2024-09-12 14:33:51,672:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFnYl9OYjcxOU5YM3lPZFFvMEdOS25EeFQyZWpWeWdLOVhrQzVBdkljeGFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMzNjQ2MDYifQ", "signature": "fP-Qt0nUKpMiwjH6HXNJ-rtjuMpaRx21YIqaCW_giWOHFuERqBg9nhM4kmxH-34ezRJgYy3fOseleGfgtAkOYMw1CXQvsFnj8bHHy3bRIsRCCoxdp_CGEr4-yJG73hdkNdJVIovccGlTCiiTz8-KszV4jstXXX0uOU6JnguwAtnMBYq-KCUUqT5Y271ImJNRp-hU017jrvLoaeyVy1thw2QaJ4pgJHkOjNQWLpCNH9V-o2ROPhZx42lVwxg74wy7tRTDCkxYmio7_nE9nwFQJ8EPeVIlJpDr3Ye8IRU9MeMo9w-ZYxXxeFbl7DNYqXc67UzY_Iyvdsn2D-EhA10L_g", "payload": "" } 2024-09-12 14:33:51,825:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123364606 HTTP/1.1" 200 805 2024-09-12 14:33:51,826:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 12 Sep 2024 12:33:52 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUlXFbbJGqYHCKiDzYG2e2aFr5D2xnWNesa9wEaGr_6ew X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:57:14Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/LOiTWA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/ndw7tA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/DMnfUA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" } ] } 2024-09-12 14:33:51,826:DEBUG:acme.client:Storing nonce: 4OmWUlyUlXFbbJGqYHCKiDzYG2e2aFr5D2xnWNesa9wEaGr_6ew 2024-09-12 14:33:51,827:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-12 14:33:51,827:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-09-12 14:33:51,828:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-12 14:33:51,828:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-12 14:33:51,829:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:33:51,829:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-12 14:33:51,829:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-12 14:33:51,829:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-12 14:33:51,830:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-12 14:33:51,831:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-09-12 14:33:51,831:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-09-12 14:33:51,831:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-09-12 14:33:51,833:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)