2024-09-11 06:54:15,598:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-09-11 06:54:15,598:DEBUG:certbot._internal.main:Arguments: [] 2024-09-11 06:54:15,599:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-09-11 06:54:16,323:DEBUG:certbot._internal.log:Root logging level set at 20 2024-09-11 06:54:16,323:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-09-11 06:54:16,362:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-09-11 06:54:16,404:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-11 06:54:16,674:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:54:16,675:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-09-11 06:54:16,679:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-09-11 06:54:16,687:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:13 UTC. 2024-09-11 06:54:16,687:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:54:16,688:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:54:16,693:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:54:16,693:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:54:16,693:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:54:16,700:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:54:16,701:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:54:16,703:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:54:17,164:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:54:17,165:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:54:17 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "O6l3j7_BA9M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-11 06:54:17,165:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:54:23,204:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8416_key-certbot.pem 2024-09-11 06:54:28,873:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8414_csr-certbot.pem 2024-09-11 06:54:28,873:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:54:28,873:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:54:29,020:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:54:29,021:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:54:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUjDpSc1C9vkDHbmsLARA3b8kVBhsizrTnrLDR1kpsyx8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:54:29,021:DEBUG:acme.client:Storing nonce: 4OmWUlyUjDpSc1C9vkDHbmsLARA3b8kVBhsizrTnrLDR1kpsyx8 2024-09-11 06:54:29,021:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:54:29,027:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVqRHBTYzFDOXZrREhibXNMQVJBM2I4a1ZCaHNpenJUbnJMRFIxa3BzeXg4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "AEQJ_lqH2yfQjb9aTi-jo2KtjXsUQagGXf4avP3AFecuifYblo5VlU5X5rygqy4HhqolGHv3m4dvqwkJIEkmtqA-2AIaMzrkD11AjNY7_Y91sYIZI8xmVTXQl2GdRzfZkKirK3Jw_toAGv2q0BVmQ7Zgu6aro2Xzx80e-sRBNr9xWGOGGrqo6Qnn-jlmNAxKXoyip2TaiHV57bO0AqfQTZxjyxErM8-HQlI1lJnCkAhBFgf05G1Gb22NHxSddltzc1Mij859_Msk5RM2nIcmdP3L73zwzxSwxa7dHctXNPY8137pFZ2sxwqxGrNbaqwva8KP9iflzw6X4uDcZ6X1ew", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-11 06:54:30,501:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-09-11 06:54:30,501:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:54:30 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144772916 Replay-Nonce: 4OmWUlyUc3YzNWBpcB6hlxQsKVgH-jgSGLfqYz_3OfTtfmLEUho X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:30Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144772916" } 2024-09-11 06:54:30,501:DEBUG:acme.client:Storing nonce: 4OmWUlyUc3YzNWBpcB6hlxQsKVgH-jgSGLfqYz_3OfTtfmLEUho 2024-09-11 06:54:30,502:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:54:30,507:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122542336: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVVjM1l6TldCcGNCNmhseFFzS1ZnSC1qZ1NHTGZxWXpfM09mVHRmbUxFVWhvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI1NDIzMzYifQ", "signature": "aX8DoIWSGVYQZhcwgebTQOlhOJjrq1EBL1J3jK36sK7QsXr624fYKOTzQElZlWOFaN7N8twpTNON637nUAEQZ189-BmLkpGgS17E82MiQoubM0BVArzpClmQu3ImZiqSW-moiZJ7w45xaW2sus3fJNkLszwEFdEH5FGZzmVJnzLPjpFt6kZc953NE5zn29qjk97_c_EgW_3YMbpQPZoE7kk4Uve0LNl5NSrxwWGVcCbl3kWUlQlG_obEyM0fzUSGHs8PLsBXUdXy-i4zch5olgUDlNXmJP4MMvFxZVNIt4KWVX_x9AAZ9aRVtYOlUmtF_d0n9kzfKKnr8kVLAkrIEA", "payload": "" } 2024-09-11 06:54:30,814:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122542336 HTTP/1.1" 200 810 2024-09-11 06:54:30,815:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:54:31 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyU6TNBowpoVusoC8RgXk0uzbeV1tlCP2t31qCUskjI0sM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:30Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/LP3L_w", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/cyyAdg", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122542336/yxREqg", "status": "pending", "token": "KGKpmtFpHVM46SyXGsx_MjT5vtkr7W5_SXlq0K6Z90k" } ] } 2024-09-11 06:54:30,815:DEBUG:acme.client:Storing nonce: 4OmWUlyU6TNBowpoVusoC8RgXk0uzbeV1tlCP2t31qCUskjI0sM 2024-09-11 06:54:30,816:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:54:30,816:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-09-11 06:54:30,827:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:54:30,827:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:54:30,831:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:54:30,831:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:54:30,831:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:54:30,832:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:54:30,836:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:54:30,873:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-11 06:54:31,122:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:54:31,123:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-11 06:54:31,123:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-11 06:54:31,128:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:31 UTC. 2024-09-11 06:54:31,128:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:54:31,128:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:54:31,133:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:54:31,134:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:54:31,134:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:54:31,140:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:54:31,140:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:54:31,142:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:54:31,592:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:54:31,592:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:54:31 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "YuPCELAD1MQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-11 06:54:31,593:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:54:37,010:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8417_key-certbot.pem 2024-09-11 06:54:42,216:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8415_csr-certbot.pem 2024-09-11 06:54:42,217:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:54:42,217:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:54:42,371:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:54:42,372:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:54:42 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQTFeg67bHWd8Cze6qVFTXXmI3vOWoDrUbuBy62af_fcc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:54:42,372:DEBUG:acme.client:Storing nonce: fCBw7MtQTFeg67bHWd8Cze6qVFTXXmI3vOWoDrUbuBy62af_fcc 2024-09-11 06:54:42,372:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:54:42,378:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFURmVnNjdiSFdkOEN6ZTZxVkZUWFhtSTN2T1dvRHJVYnVCeTYyYWZfZmNjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "AgUiENt1UAzLlZ4MaZvC6RJwmAvP4Fn13Dzbvr4Ghdff7Qa6udJjBd-rUS1YHVQXWoFn1qIgOFsKO-_V6wzZc2zhNlf38gUn4naHrgJl9rVzNQIkmA9R3P1jHuhMX5DeDTwIbmqhRjTP1gTX8i3juPwbQrJd2aXFpcUgeE7D9YSaJq1Lje0Y0VJvlPLs_6vlkqvDbls9Gch7XWqD7XYlmQtxMGrT-cWp8as4tEp4o2wU3Jl6j58LEcAgpaXrny6wQVq6doV4WKi7-m2dx5tAAteyLWKP5aqAxyb8orer1foOAG1XdOaCa6A1UvWoTB057BZQz_4Ztq94aZNnVyAPfw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-11 06:54:43,903:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-09-11 06:54:43,904:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:54:44 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144813576 Replay-Nonce: fCBw7MtQ_Ytfg03DIrhAmvZklW3KapHYZe_ARRddT83EL-hf3n8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:43Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144813576" } 2024-09-11 06:54:43,904:DEBUG:acme.client:Storing nonce: fCBw7MtQ_Ytfg03DIrhAmvZklW3KapHYZe_ARRddT83EL-hf3n8 2024-09-11 06:54:43,904:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:54:43,910:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122604166: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFfWXRmZzAzRElyaEFtdlprbFczS2FwSFlaZV9BUlJkZFQ4M0VMLWhmM244IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2MDQxNjYifQ", "signature": "p_mNFs2JPzli077-DPRw0kq1roAX0Aietw498TxQxaBDYV8LkRm1B2gY-rRlHKuGKgIQio16oMAdolBLqX3eeswx6T9awm9K-Cv50JAWWyrLN7AokOjmV7O0X7OngNISIjpCZjOGb1mz84pq9Q6zW7DkCwBiMPRXgUpWW--_Rqmtk6i5m_P8CcscJ61l1zaPr1qphz_wMZhK-nwL_zizIBELpeIA7sxnE7H9e8fcZCSwAUgAYjdWb5BRMZPBX4nmE86b_05emRmyR74JFBcP5uy81PCD3kjOtT9K6jhX4nRX2KhE8WNidbGViZyFBQedByqeiY_oJfeODl8S1lhG-A", "payload": "" } 2024-09-11 06:54:44,185:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122604166 HTTP/1.1" 200 804 2024-09-11 06:54:44,185:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:54:44 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUCwNwHi5ypyQnFd0XjIKHM6U5LEgGPp2vjkdHwy8AACY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:43Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/osHCwQ", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/ZP8ZRQ", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122604166/uKF3Wg", "status": "pending", "token": "36-pOOGC0_Ei3qt3Hmb3gAXe4VTkowkPBOPjz2hNtNo" } ] } 2024-09-11 06:54:44,185:DEBUG:acme.client:Storing nonce: 4OmWUlyUCwNwHi5ypyQnFd0XjIKHM6U5LEgGPp2vjkdHwy8AACY 2024-09-11 06:54:44,186:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:54:44,186:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-09-11 06:54:44,187:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:54:44,187:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:54:44,188:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:54:44,188:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:54:44,188:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:54:44,188:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:54:44,189:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:54:44,240:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-11 06:54:44,515:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:54:44,517:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-11 06:54:44,517:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-11 06:54:44,522:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:34:49 UTC. 2024-09-11 06:54:44,522:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:54:44,522:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:54:44,527:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:54:44,527:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:54:44,527:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:54:44,532:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:54:44,533:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:54:44,535:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:54:45,058:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:54:45,059:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:54:45 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "eL93DDbwfk0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-11 06:54:45,059:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:54:50,563:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8418_key-certbot.pem 2024-09-11 06:54:55,718:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8416_csr-certbot.pem 2024-09-11 06:54:55,719:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:54:55,719:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:54:55,895:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:54:55,896:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:54:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStKYH03vpUpUBhUFLEji5VKIt4K3LWpFQtAZesIZO4MZU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:54:55,896:DEBUG:acme.client:Storing nonce: 0Nvv4YStKYH03vpUpUBhUFLEji5VKIt4K3LWpFQtAZesIZO4MZU 2024-09-11 06:54:55,896:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:54:55,902:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3RLWUgwM3ZwVXBVQmhVRkxFamk1VktJdDRLM0xXcEZRdEFaZXNJWk80TVpVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Wg_--zhBRYOF8V3VFAENwREjt4HJulZhlwWcJzie2iROjj9i3Utouk0cQOqcQhYHIuwHGPUFvIGAtU7dqiSQR9NTrCVRedz1VNmPlKRzPPtyTrKrLIKW4lK7kR7x-2BxdjNJf2aVWzYE43XNmPHwnHNnh3Njmw717cv8fYXRyvxczGF0PWA2pa2s7GERIxBgoUW8kMd9TJVwrIUosFifKUqF96OTTRp2wj5WJSnc-w0euQiwG6PZ5_fhy-C3LhfkTPr2Hzv-9PgsYMT2pJ_qDGWwiPp-Wn3hLIfZaA55uuF9dFuyMJ7BvrjkU-dMMCP4Tq6w5-tr-Vn9Q9F0MD_WxQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-11 06:54:56,164:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-09-11 06:54:56,164:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:54:56 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144849776 Replay-Nonce: 0Nvv4YStvbayDdHsIQAAUsfusgv6Fh8zkgJkEbWQhn6qGvPwoQc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:54:56Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144849776" } 2024-09-11 06:54:56,165:DEBUG:acme.client:Storing nonce: 0Nvv4YStvbayDdHsIQAAUsfusgv6Fh8zkgJkEbWQhn6qGvPwoQc 2024-09-11 06:54:56,165:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:54:56,171:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122659596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3R2YmF5RGRIc0lRQUFVc2Z1c2d2NkZoOHprZ0prRWJXUWhuNnFHdlB3b1FjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI2NTk1OTYifQ", "signature": "iiFgiFMQEhuXd-ylGa4izJeiMblHNaUp98N3h6CJfCN6xs0erReHpxhheOVN6MpXTSnoD50iuCWRDOQYe_9DaM8FITljtSxoLdjStoZaMQhUqAGmY8UgswOXzNsA5OqKFOT2PprUzP2vtWhh9StqXP35oea-tBPZdIQb72Vgtci1ZlWBVATJ_X91aHGhK2gDlCFH7cJaH3YYfoWWLHmmD7gdslT785-mwXTxQlb0kjnG_hTrNyE804ZAKb5Vrxm8PybHt_f46mUjzxYoNlHJhyLrS79Nq7hItaOLFBoralhAR1udt8IzlNl7HjQTYvVR6YAOnvk5Cb4_eP_TkUMO-Q", "payload": "" } 2024-09-11 06:54:56,353:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122659596 HTTP/1.1" 200 807 2024-09-11 06:54:56,354:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:54:56 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwPvOF7cRIeSEYq9oNpHuGFbS0Zrmca7eSGqw89ounLl4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:54:56Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/2L4MUQ", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/osx5jQ", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122659596/mCb-BA", "status": "pending", "token": "1ykkbaaG9jMiafKy94XmZwsVZI2X695b3irSixNr-WM" } ] } 2024-09-11 06:54:56,354:DEBUG:acme.client:Storing nonce: UAMvsxnwPvOF7cRIeSEYq9oNpHuGFbS0Zrmca7eSGqw89ounLl4 2024-09-11 06:54:56,354:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:54:56,355:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-09-11 06:54:56,355:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:54:56,355:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:54:56,356:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:54:56,356:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:54:56,356:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:54:56,357:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:54:56,358:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:54:56,406:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-11 06:54:56,619:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:54:56,621:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-09-11 06:54:56,621:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-09-11 06:54:56,625:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-09-11 06:54:56,629:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:54:56,676:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-11 06:54:56,900:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:54:56,902:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-11 06:54:56,902:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-11 06:54:56,907:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:07 UTC. 2024-09-11 06:54:56,907:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:54:56,907:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:54:56,912:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:54:56,912:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:54:56,912:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:54:56,917:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:54:56,918:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:54:56,920:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:54:57,441:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:54:57,441:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:54:57 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "h__yrIkq4YI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-11 06:54:57,442:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:55:02,836:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8419_key-certbot.pem 2024-09-11 06:55:08,019:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8417_csr-certbot.pem 2024-09-11 06:55:08,020:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:55:08,020:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:55:08,196:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:55:08,196:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwbtZECLyxnKf8tCVJswrio_qZK_taMtGm38UPON8XfXQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:55:08,197:DEBUG:acme.client:Storing nonce: UAMvsxnwbtZECLyxnKf8tCVJswrio_qZK_taMtGm38UPON8XfXQ 2024-09-11 06:55:08,197:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:55:08,203:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndidFpFQ0x5eG5LZjh0Q1ZKc3dyaW9fcVpLX3RhTXRHbTM4VVBPTjhYZlhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JZBlKwwcdOT8nbeq9zzVCOkulQPwOUVzH6zVXo-2J6iN9BRQKjsCg7NXjn7PK-ure2Loe5w2YxIsBqfYXADYdQUJIWhJy8MFFBmP-xugTz9TM6_cwykuXayiB2b8LxfsmE9XzpYPtrCvcj_X-5aRwRcFuYmiEMq6FEDMBuvA4-XdP4lRcvdVf7RkJQh3D0fM9Le6wFHASQU-JBTouuB4buIa2A-N04ca69o92WNgmEpMAJvvII1bvgjcU69CnewXz26SQJEzzNVPhmAbWCGQfwWYxJGJdMT0ijKI-_nDig0bmGw9YTE0sA_0WmNHRH1hMJ_fdrqjv-13YfKA979NKg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-11 06:55:08,477:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-09-11 06:55:08,478:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:55:08 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144900966 Replay-Nonce: 0Nvv4YSt--USpe3b8lpWu-7M9D0CkLxz182e9AJqgtmjReUcvj8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:08Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144900966" } 2024-09-11 06:55:08,478:DEBUG:acme.client:Storing nonce: 0Nvv4YSt--USpe3b8lpWu-7M9D0CkLxz182e9AJqgtmjReUcvj8 2024-09-11 06:55:08,478:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:55:08,484:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122729086: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3QtLVVTcGUzYjhscFd1LTdNOUQwQ2tMeHoxODJlOUFKcWd0bWpSZVVjdmo4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3MjkwODYifQ", "signature": "cAEPV54XN9EPBK3mCybf-bOg5cWHlua4REaPraBeC4GF6jdkAbYxrE_2gyRivoWsh-zyZIbJ5VV-a8TRfYeRo58XrYhSzsvRBOWuX5tNp0XVV9vQfYgxhIN8bKLUcAcaVVECZAxmP1oEYPaDOPWC9XEUuhiqRcs11J0LIKhpdvY6k8jpaR0XVagn8NKdgf0RH3aYO5zpluHE4UB4CLb4XHn8MmDIW28xJkWfZnSHnKJ1e2fYD2xXpNTOrvb7gTjRVVBbsr7GmPjwgyz6p2UQ28rCQd861cS_wLWDQ_rgjjUGBJrKU3wWS0lMoFslsRp1P78wzk98nh8_1y_dB2a4Ig", "payload": "" } 2024-09-11 06:55:08,671:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122729086 HTTP/1.1" 200 801 2024-09-11 06:55:08,673:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:09 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnw41g0AAQiIzW95gsNuZ60lkvSFB8GBNCbUna2UNQTHYI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:08Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ShHY7A", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/e_W2mQ", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122729086/ch6DzQ", "status": "pending", "token": "dA0DvQKQEgjpuWXAXG7HKddGrUR_mwhryU3AHK_is5c" } ] } 2024-09-11 06:55:08,673:DEBUG:acme.client:Storing nonce: UAMvsxnw41g0AAQiIzW95gsNuZ60lkvSFB8GBNCbUna2UNQTHYI 2024-09-11 06:55:08,673:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:55:08,684:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-09-11 06:55:08,685:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:55:08,685:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:55:08,686:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:55:08,686:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:55:08,686:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:55:08,687:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:55:08,688:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:55:08,726:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-11 06:55:09,029:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:55:09,030:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-11 06:55:09,031:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-11 06:55:09,035:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:25 UTC. 2024-09-11 06:55:09,036:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:55:09,036:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:55:09,041:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:55:09,041:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:55:09,041:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:55:09,046:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:55:09,046:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:55:09,048:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:55:09,571:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:55:09,571:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:09 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "t4fM5lY1vqc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-09-11 06:55:09,572:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:55:14,827:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8420_key-certbot.pem 2024-09-11 06:55:19,947:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8418_csr-certbot.pem 2024-09-11 06:55:19,947:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:55:19,947:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:55:20,121:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:55:20,122:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwnpMjltlFsPNjdLf5wdvKg5PflNi_Kx0cmiyVMMZPjLA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:55:20,122:DEBUG:acme.client:Storing nonce: UAMvsxnwnpMjltlFsPNjdLf5wdvKg5PflNi_Kx0cmiyVMMZPjLA 2024-09-11 06:55:20,122:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:55:20,128:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bnducE1qbHRsRnNQTmpkTGY1d2R2S2c1UGZsTmlfS3gwY21peVZNTVpQakxBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "rsQhAu3k7UqKmqhDrLTcIUr0Ng6AZL3bd_86iDD3Rl0zWfA_7wNkHtnxYkQzAwYcHdkTYlPpCLNsT7tcpuCHLQRY8mI-0rXmIpEDOSl9qZIRmCWvBXn8iX8BzRcyjEbPIh7h7dlW1oxH59IV3Z4cLvzUxIVuxMI5LKol1fgaeduokyuxNi1oJZKaNLbMrQxRIyvNCen5CKm_BBVVjjCAYzglNQGPp7wWy8c2yffYD7-HweW1A5WL-gmoF8-58WkD-JtRYvlOVbP9fZVdwm2VIK04hYOM5KasS-08rzS73wz6P7ro21QaV-gDvGcvxGUtI6BO0PwLpzgSjoTqfC6Vvw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-11 06:55:20,388:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-11 06:55:20,389:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:55:20 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144940076 Replay-Nonce: UAMvsxnwdEyJiW195v9cVnGfjMiXZhmDEaWWWqnL0t5Docu6j70 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:20Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144940076" } 2024-09-11 06:55:20,389:DEBUG:acme.client:Storing nonce: UAMvsxnwdEyJiW195v9cVnGfjMiXZhmDEaWWWqnL0t5Docu6j70 2024-09-11 06:55:20,389:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:55:20,395:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122790136: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndkRXlKaVcxOTV2OWNWbkdmak1pWFpobURFYVdXV3FuTDB0NURvY3U2ajcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI3OTAxMzYifQ", "signature": "vtPW16moLfyfV28NpRNrRNG6vcFcJxz5tykf-68B775c-QJ8Hqa3brVOM3DfLVVpLfpasU0PurdUBrDCyuXDRlM9pTu-8ApF5tWDB8ObqizgLuw3AoBM8qixSGOE9K68LW9SwrAHFNZH7xbN8XZoCKYRQ3-XTgA6m6FeuJry_-BMnNxIncrO4AqrkekkrbqvGsbL1qBAnjPwVhuLk2AWJr84tzgy0YIgbP7P1jyyjGWnWec2SeVEIhbFopRCEg6QvjYj8YMVBkM6wYHWHGrirGHza5ZLXURf6rAFUGVoan9yqzNijoTOk9IHoUKL65RH_RYN9cE3sHDhTKEIWPxEGQ", "payload": "" } 2024-09-11 06:55:20,572:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122790136 HTTP/1.1" 200 805 2024-09-11 06:55:20,573:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:20 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwjuuJC-JBYhtravgVUfLuFS4xSyjMkAHId61zlRF_N4Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:20Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/fCm5hA", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/X2nDCw", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122790136/HbiFxg", "status": "pending", "token": "eysZb9VY8KJd4MKHTIhgJhXSdj3cXfxJ9ZHNYOBJXn4" } ] } 2024-09-11 06:55:20,573:DEBUG:acme.client:Storing nonce: UAMvsxnwjuuJC-JBYhtravgVUfLuFS4xSyjMkAHId61zlRF_N4Y 2024-09-11 06:55:20,574:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:55:20,574:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-09-11 06:55:20,575:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:55:20,575:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:55:20,576:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:55:20,576:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:55:20,576:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:55:20,576:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:55:20,577:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:55:20,625:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-11 06:55:21,036:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:55:21,037:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-11 06:55:21,038:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-11 06:55:21,042:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:35:43 UTC. 2024-09-11 06:55:21,043:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:55:21,043:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:55:21,048:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:55:21,048:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:55:21,048:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:55:21,053:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:55:21,053:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:55:21,055:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:55:21,576:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:55:21,577:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:21 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1xaOe7GoivE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-11 06:55:21,577:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:55:27,117:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8421_key-certbot.pem 2024-09-11 06:55:32,444:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8419_csr-certbot.pem 2024-09-11 06:55:32,445:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:55:32,445:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:55:32,618:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:55:32,619:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwf-P0EnQsx4z1_-tDPED4h6M6dPfTfyXAB862QD9Tpl8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:55:32,619:DEBUG:acme.client:Storing nonce: UAMvsxnwf-P0EnQsx4z1_-tDPED4h6M6dPfTfyXAB862QD9Tpl8 2024-09-11 06:55:32,619:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:55:32,626:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndmLVAwRW5Rc3g0ejFfLXREUEVENGg2TTZkUGZUZnlYQUI4NjJRRDlUcGw4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "RcnnjJOg4UR5lpkRvuguAXYgN1JMJFDqtNf_4xHlYuQQCN9hXW9yJ1CpJ0V_KFcKB8nQ2ZufsJXflQDiOIvIplH87o-QlH6fCEzjBOPm8qDRjbjT9UuyngZpn9qp3err-y8wmqBRhgWQ1UlT9uPn4A9BlRDU7GUcP7onIGOJnWRLtEE_lotiDs8otn98RPE17ZxGSMb1AYXSAKyE6epEzgnHI392IoFWCPsc3Q6qZ8WtiIQJASGx5sFi3Aw9Eyn0ovwelMeSK7vsNfpedEOJ6Rnb05SN7daNsHnp08QBoEsjxp9-aSdNb7TaEGg2cEbekUuFobGqOsINz3pv8LkHDw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-11 06:55:32,920:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-09-11 06:55:32,921:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:55:33 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304144979426 Replay-Nonce: 0Nvv4YSt17iHIAQE5E46qTdHnfZFIGm2lQERjnFJ1ahltuB8ZlA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:33Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304144979426" } 2024-09-11 06:55:32,921:DEBUG:acme.client:Storing nonce: 0Nvv4YSt17iHIAQE5E46qTdHnfZFIGm2lQERjnFJ1ahltuB8ZlA 2024-09-11 06:55:32,921:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:55:32,928:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122851136: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3QxN2lISUFRRTVFNDZxVGRIbmZaRklHbTJsUUVSam5GSjFhaGx0dUI4WmxBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI4NTExMzYifQ", "signature": "ZR1M3QKNjKCi-ML6Iz-RmssiKmr_4dqgRKYag6xI84WAXYMKKrhTeeDqzpPSjOOkug7LcOPXm4v6EYGcNsJ-cVsY7z5vb8nzLUrAaZtEPaeS2dj1ZwrOo1mqCNCoAKvC1Q9zGUHHUpvlGEdbufQTSgIx8QIcoi3cLJn1JjXabl3NLKZ_i4_ft3y1RcOrWejdgx2ByCeUfQ02ZkxLu0PfDMyYuChUxmdwrtn_9hhJ3h8K54VRljkZM2sWkZ9hyPQAtM7RYLsgL_vxz1rTTk_MlPxsBYWa7kMdo9W_8Qvx0GkE7yhpif3omg0GB4umlDv0fTtWI92ckH_EHkY34SvXVw", "payload": "" } 2024-09-11 06:55:33,110:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122851136 HTTP/1.1" 200 809 2024-09-11 06:55:33,111:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:33 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwteGzt2PLCrEw8BmOomDEET4yOepxxu8aDiRceIi99Fg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:33Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/kuyLHA", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/nTAn0w", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122851136/Kdwo9g", "status": "pending", "token": "WQFehCEhHL06z1HKvT7hfq89z8DHqy8FPlOZpeeXyiY" } ] } 2024-09-11 06:55:33,111:DEBUG:acme.client:Storing nonce: UAMvsxnwteGzt2PLCrEw8BmOomDEET4yOepxxu8aDiRceIi99Fg 2024-09-11 06:55:33,113:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:55:33,113:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-09-11 06:55:33,114:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:55:33,114:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:55:33,115:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:55:33,115:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:55:33,115:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:55:33,116:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:55:33,117:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:55:33,164:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-11 06:55:33,566:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:55:33,567:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is signed by the certificate's issuer. 2024-09-11 06:55:33,568:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert2.pem is: OCSPCertStatus.GOOD 2024-09-11 06:55:33,571:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:14 UTC. 2024-09-11 06:55:33,572:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:55:33,572:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:55:33,577:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:55:33,577:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:55:33,577:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:55:33,582:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:55:33,583:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:55:33,585:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:55:34,119:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:55:34,119:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:34 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "ktiIwaEhQeM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-11 06:55:34,120:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:55:39,743:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8422_key-certbot.pem 2024-09-11 06:55:44,901:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8420_csr-certbot.pem 2024-09-11 06:55:44,902:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:55:44,902:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:55:45,081:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:55:45,081:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwL8ipE2IAZbIM3Q7hrrdvjBRv7RqAuw58Ko3qH99G2QQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:55:45,082:DEBUG:acme.client:Storing nonce: UAMvsxnwL8ipE2IAZbIM3Q7hrrdvjBRv7RqAuw58Ko3qH99G2QQ 2024-09-11 06:55:45,082:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:55:45,088:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndMOGlwRTJJQVpiSU0zUTdocnJkdmpCUnY3UnFBdXc1OEtvM3FIOTlHMlFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iGrK-iS4gsYVm5pBm_bOm9pth1veKt07M3cH3FJn-jW93OlCwCPPzkjGfMRmKQkcLbWoLW2suSouZ-J1eoK1EsTcmamCYOsFAvr46RRqmE0MnZKvkWu6KL8SkCP91LvN8W5EBqGINEP9OzX5nCMWcQo1A9jVziHiR93U0jMmKjQOemt3kVb1amK9NJ_p8XCgumyjE5M-7Wpmg1bRaOIAG7JfMMRu3dc5cokP8LRBMdYGKOXhXwBfVrbm-DlrmofuGeR6xvk8Yox4GGGMxTbEOKfZUqCFT3Mx0X04TFINlSkNX96kNPheHcgG_HZwOz91z16v58wv2vmhqkiSHwpstw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-11 06:55:45,350:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-09-11 06:55:45,351:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:55:45 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145018096 Replay-Nonce: 0Nvv4YSt4EyZu409VEfhFl9TDm91-Xqlfsf2K7UlNxLS5HfzVZE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:45Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145018096" } 2024-09-11 06:55:45,351:DEBUG:acme.client:Storing nonce: 0Nvv4YSt4EyZu409VEfhFl9TDm91-Xqlfsf2K7UlNxLS5HfzVZE 2024-09-11 06:55:45,351:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:55:45,357:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122910996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3Q0RXladTQwOVZFZmhGbDlURG05MS1YcWxmc2YySzdVbE54TFM1SGZ6VlpFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5MTA5OTYifQ", "signature": "sqWS9tKSHH6B9nAQ1gStpfJ22Ldr_04ZehWS-rhvICnuX1JlVYsQVgxJvsk5oYQzUcufCq3Kh25Yzbs1v-KsftcW1uFcnu3lOBEBAR2V9OdSMFw66Sn1bmFQ-CSsoznXN9Zhuo5zt6DqKQbFDt82DteWRd9N5iirYKxfAn_rori0gtskGzH2lRPtwcfj2NN-eqQDG-KR99TRQPpNB3Xz1PH5Uw1TR4QUnPrCyjcOW93PrdW6938ESMv55whn5_0jYxoVWuneFndEOffhLKlpphzA3ywHzAKrZ4V5OyIY3HwUihTOFOPg7EI9TpUWech6HluyFy-uTb0l3PscTdgNvA", "payload": "" } 2024-09-11 06:55:45,540:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122910996 HTTP/1.1" 200 807 2024-09-11 06:55:45,541:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:45 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStLGLX7v_megoHKFwrG3xQMDWkDcygMEuKqojJDrIHVPg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:45Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/QNmv8g", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/4_hHkg", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122910996/Xg0Zog", "status": "pending", "token": "v-16JM26XpbTu4B-l4IXURUwIVtTU4ZVpZna8Q0Ik9k" } ] } 2024-09-11 06:55:45,541:DEBUG:acme.client:Storing nonce: 0Nvv4YStLGLX7v_megoHKFwrG3xQMDWkDcygMEuKqojJDrIHVPg 2024-09-11 06:55:45,543:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:55:45,543:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-09-11 06:55:45,543:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:55:45,544:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:55:45,544:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:55:45,545:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:55:45,545:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:55:45,545:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:55:45,546:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:55:45,594:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-11 06:55:45,818:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:55:45,819:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-11 06:55:45,820:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-11 06:55:45,824:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:33 UTC. 2024-09-11 06:55:45,825:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:55:45,825:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:55:45,830:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:55:45,830:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:55:45,830:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:55:45,835:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:55:45,836:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:55:45,838:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:55:46,279:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:55:46,280:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:46 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "drDMxnGBazY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-11 06:55:46,280:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:55:51,596:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8423_key-certbot.pem 2024-09-11 06:55:56,755:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8421_csr-certbot.pem 2024-09-11 06:55:56,756:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:55:56,756:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:55:56,904:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:55:56,905:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQ5OXMMjOyqxftSlB2adJ4gFz8JkB76Ft6h7cxQ_KH_io X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:55:56,905:DEBUG:acme.client:Storing nonce: fCBw7MtQ5OXMMjOyqxftSlB2adJ4gFz8JkB76Ft6h7cxQ_KH_io 2024-09-11 06:55:56,905:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:55:56,911:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFE1T1hNTWpPeXF4ZnRTbEIyYWRKNGdGejhKa0I3NkZ0Nmg3Y3hRX0tIX2lvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "VRTUqGo6cI9E4w2xE2fpvDP_2Ji4hKsBY2doNS0tPRGdeFmL5xqsNQ8OJJjksMbDFOKzQCub41EZZNpz9At8TI_UhFi_gG21xivW-ySrRfaBRJVBlxhyUgzJVcoYeQ3urzywBcWYXnwM5umZ2OdjE4muIzUQXYLTagatHc-4JkKRLNsUJmVnQXOiSEUwONIAISio6SNWYV-E2sQUEWyGvGDONnR65IP7r0w3RRVIv2C2m5k-w5g0imcJiRlZsKIx4INnr-2Mj-dXtsbZfZfCS5Sxp0I864T2O6SyFb4A8TEPVYRsVhiJR_XX5S7_mQD-wSFK7z0VVEloqd3Bd0Fxzw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-11 06:55:58,203:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-09-11 06:55:58,204:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:55:58 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145056036 Replay-Nonce: fCBw7MtQq3Rr-4wRDbOBpkdbqbyGq9mrAEMiXWG9kJ1bQLewKz8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:55:58Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145056036" } 2024-09-11 06:55:58,204:DEBUG:acme.client:Storing nonce: fCBw7MtQq3Rr-4wRDbOBpkdbqbyGq9mrAEMiXWG9kJ1bQLewKz8 2024-09-11 06:55:58,204:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:55:58,210:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402122966996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFxM1JyLTR3UkRiT0Jwa2RicWJ5R3E5bXJBRU1pWFdHOWtKMWJRTGV3S3o4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjI5NjY5OTYifQ", "signature": "IZFxOUjUEJCuMvOiBHugRSrwjG0LUFddudPnILkiEydCnOp04Ur9NyRkNxg0xG8oYMTbylD9q5XPT8fH0k0h6mvv7WaxJwFIUxaOt8hM6MThP4wdIqSytUuNOfo8_j9TYKq0aQ_DjbfgMnoGgVTxTrVnFtf4ITyDi9d2TWrriezn5myZBzF9GXmmD02b3UwoJN-zh9qge3Xp8PyyMgwZrvapjESoBu922lRG07Vnnvo1vMFY-UxQm_IizRjnm3EMxUwLhSKHbzSW3V86kFqUjbr1azo75KWtz3NT6oebch4oDg4ylUauKrUOVcYohKrTM4hURzl0F4PjEW8Qg_O2fQ", "payload": "" } 2024-09-11 06:55:58,492:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402122966996 HTTP/1.1" 200 806 2024-09-11 06:55:58,498:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:58 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUiT1_tfPw6sH_vRgZaWBICWNt8TuV_F5AuhSywrN-mP4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:55:58Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/9cCtaA", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/RuQu8g", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402122966996/lsTunA", "status": "pending", "token": "-Kk-8G6b6cKqp5o2xqZRjeS1sg7bE9t1qigSzPQmMIM" } ] } 2024-09-11 06:55:58,498:DEBUG:acme.client:Storing nonce: 4OmWUlyUiT1_tfPw6sH_vRgZaWBICWNt8TuV_F5AuhSywrN-mP4 2024-09-11 06:55:58,500:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:55:58,501:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-09-11 06:55:58,501:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:55:58,502:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:55:58,502:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:55:58,503:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:55:58,503:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:55:58,503:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:55:58,504:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:55:58,540:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-09-11 06:55:58,540:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:55:58,541:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-09-11 06:55:58,547:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-09-11 06:55:58,549:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-09-11 06:55:58,549:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-09-11 06:55:58,549:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-09-11 06:55:58,550:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-09-11 06:55:58,552:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-09-11 06:55:58,593:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-11 06:55:58,963:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:55:58,964:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-11 06:55:58,964:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-11 06:55:58,969:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:36:53 UTC. 2024-09-11 06:55:58,970:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:55:58,970:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:55:58,975:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:55:58,975:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:55:58,975:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:55:58,980:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:55:58,981:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:55:58,983:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:55:59,419:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:55:59,419:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:55:59 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "UPS_Bu6max0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-11 06:55:59,420:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:56:04,672:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8424_key-certbot.pem 2024-09-11 06:56:09,839:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8422_csr-certbot.pem 2024-09-11 06:56:09,840:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:56:09,840:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:56:10,002:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:56:10,003:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:56:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQYHfcxZxTElfPujLYu8LEKvIBEVFPq4-v9f1dsGkNEo0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:56:10,003:DEBUG:acme.client:Storing nonce: fCBw7MtQYHfcxZxTElfPujLYu8LEKvIBEVFPq4-v9f1dsGkNEo0 2024-09-11 06:56:10,003:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:56:10,009:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFZSGZjeFp4VEVsZlB1akxZdThMRUt2SUJFVkZQcTQtdjlmMWRzR2tORW8wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tXgKowhIwGNjm7rnqyHynv9jyUqNknjuO6Pam8PoMXXAbo5IA7RiaPLuJ4VJO68r6aX6gAzqweeSGIf1edjaNRFlAckcWea1Eto0a5pn8S4BC_nAWaYbfVz9hNCg6dRffSX4AkjtpdHWI4sjaTWrZOqtEOC830Xq0gkI2Hl5537lQykJKw_BAEKFBq3SDbc3CQQhf8hHNjTZGVuJ4FBt43V-VoOXCQxqHslFF8_-ATDAlrxVH9PJwxzLvSPl5XQZJ8YnpFDKP1AibXoYAfitoLM8q_CEGEtrgC_-uTEQwMNcj42dYHrAt09x2ZDRgFBPcMRO6qINzcT0rNJTRUFJ5Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-11 06:56:11,587:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-09-11 06:56:11,588:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:56:11 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145110166 Replay-Nonce: fCBw7MtQAgiiE2g6iTPdw94t84QeDmi0WxmY9G_gEo159f8iBpI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:11Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145110166" } 2024-09-11 06:56:11,588:DEBUG:acme.client:Storing nonce: fCBw7MtQAgiiE2g6iTPdw94t84QeDmi0WxmY9G_gEo159f8iBpI 2024-09-11 06:56:11,589:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:56:11,595:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123043486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFBZ2lpRTJnNmlUUGR3OTR0ODRRZURtaTBXeG1ZOUdfZ0VvMTU5ZjhpQnBJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMwNDM0ODYifQ", "signature": "Ak-3Kgakb-Jc7GRLPMy5Gvw3nvRELtgsCDTV5Vulc_4CqAgCfVEFCCMG3ykz0HemCc00Wwhw1lDuQ_FVbDXJxdxtVEUg_5ByBYWWyrebEhlmoK6fiuEVfo_My05Lq5UvX1FNXdqTZ8vf0Htizne-c94Dv1K-BUYWhOmPIUnpdIPsGcWy6AzhoAAh_ZQd5qCR-COlIJBK7kHVMZdI0r2taNvP0s7j9mdLh9-oy94vqWIFh74dpJJTSmOOdJI6Aac3XENZ3aJn0E5bdcV6sZlmndoma8zMlZ5KjyiKHKPfkCfNCdN_uazvw933CJ8QWOUYWLODgEpcVcTVGp2jCuU4PA", "payload": "" } 2024-09-11 06:56:11,816:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123043486 HTTP/1.1" 200 811 2024-09-11 06:56:11,817:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:56:12 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUsmbB1PYfLnPPq3aoDl3UDunYJwQfVonWG0uRMCxgD84 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/6UDG0g", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/5SnKCA", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123043486/oHWByA", "status": "pending", "token": "ow_8Qbkpo4HQxPBF9Rtq3Sk62oyuEX_xJuBRbXdGZlk" } ] } 2024-09-11 06:56:11,817:DEBUG:acme.client:Storing nonce: 4OmWUlyUsmbB1PYfLnPPq3aoDl3UDunYJwQfVonWG0uRMCxgD84 2024-09-11 06:56:11,818:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:56:11,818:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-09-11 06:56:11,818:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:56:11,818:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:56:11,819:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:56:11,819:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:56:11,820:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:56:11,820:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:56:11,821:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:56:11,870:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2024-09-11 06:56:12,087:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:56:12,088:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-11 06:56:12,088:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-11 06:56:12,093:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:20 UTC. 2024-09-11 06:56:12,093:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:56:12,093:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:56:12,098:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:56:12,098:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:56:12,099:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:56:12,104:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:56:12,105:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:56:12,107:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:56:12,543:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:56:12,544:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:56:12 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FuVbLYxBiNQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-11 06:56:12,544:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:56:18,232:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8425_key-certbot.pem 2024-09-11 06:56:23,414:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8423_csr-certbot.pem 2024-09-11 06:56:23,414:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:56:23,414:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:56:23,560:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:56:23,560:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:56:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyU6RL0kiwWWQWwCvbh7FAlfslujBd7G8g4ExsM3MKWaTM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:56:23,561:DEBUG:acme.client:Storing nonce: 4OmWUlyU6RL0kiwWWQWwCvbh7FAlfslujBd7G8g4ExsM3MKWaTM 2024-09-11 06:56:23,561:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:56:23,568:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNE9tV1VseVU2Ukwwa2l3V1dRV3dDdmJoN0ZBbGZzbHVqQmQ3RzhnNEV4c00zTUtXYVRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PQrUPMl9Uu9l5fAHRqVJ_gd0V5M0ZpRdA36Dekc3yLqkXNEHIbRHRlNFtt-x1d6VzkHyYhQIPIprDfkyIfRJjZ3pVZ2gw-LADCV2dgDK9JuG0_8zeMTeIbRsD8TBfnEic2gn0I-TlP2rkw9xU3wj6fTbm_GFMaErGUU162SMc5rIPlbN3miVLciFf3lFQ_VSqFkFSjJz4nSEtGgzoRijE3A36-l3JOfWMchY-ymDgkGHTQ8cVgT06VPyHKKFl7qI8oSW2p9ePjbH-7aKo6S5bsAph-yE4AhTnBUkjngIG6XivzMSpdfBKl2brOPVWbnzze7WKm7Pp7k8W8MII2yRTA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-09-11 06:56:24,911:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-09-11 06:56:24,912:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:56:25 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145156016 Replay-Nonce: fCBw7MtQSjwf13EQBKGfMK5JpTZmdBtEjShMOvVWmdWjk7l-mxY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:24Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145156016" } 2024-09-11 06:56:24,912:DEBUG:acme.client:Storing nonce: fCBw7MtQSjwf13EQBKGfMK5JpTZmdBtEjShMOvVWmdWjk7l-mxY 2024-09-11 06:56:24,912:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:56:24,918:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123114366: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFTandmMTNFUUJLR2ZNSzVKcFRabWRCdEVqU2hNT3ZWV21kV2prN2wtbXhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxMTQzNjYifQ", "signature": "EKcvp3dAvel8dVzqHr2-1OBb_aJXxFI4jNtE4EhchiKIyjWtA88gcZY3jLacUE-a7hFQPV9_FWzj_aV2NtihpB4QvHCxc_eageddtt04lgW48V0ZfPghaOXXv_Qo3lkYoxrkEx5N4FtQa48p9QKncwE6247k_8V6a6AMShQmElG6u5iw0j58s_uvpPclkM9l2wZZCNfWrSjrDTMdTCD8_obx4SECORhimNp33jLIDnoKXZn_7al7_Ho7a-6HdhDngN9wBqPIEOaLkPJDG5KX01RMZEmWRy1m-qlnaXQLSsqPJ1OtgwA6dBET5JbScDcLj9uJB4-e07ulkShN9w-Cyw", "payload": "" } 2024-09-11 06:56:25,199:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123114366 HTTP/1.1" 200 810 2024-09-11 06:56:25,200:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:56:25 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQEs7W5MB33Fnk3cnzfCS-_95ZKvx7k-EM5bsDdngLN-M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:24Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/hpZofw", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/0k48SQ", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123114366/K6FLfA", "status": "pending", "token": "MW1NrOm4XmLklQCHVBXju7g6CQ6BkHHE5kCvq15a17A" } ] } 2024-09-11 06:56:25,200:DEBUG:acme.client:Storing nonce: fCBw7MtQEs7W5MB33Fnk3cnzfCS-_95ZKvx7k-EM5bsDdngLN-M 2024-09-11 06:56:25,201:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:56:25,201:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-09-11 06:56:25,201:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:56:25,201:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:56:25,202:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:56:25,202:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:56:25,202:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:56:25,203:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:56:25,204:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:56:25,240:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-11 06:56:25,462:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:56:25,464:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-09-11 06:56:25,464:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-09-11 06:56:25,469:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:39 UTC. 2024-09-11 06:56:25,469:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:56:25,469:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:56:25,474:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:56:25,474:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:56:25,474:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:56:25,479:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:56:25,480:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:56:25,482:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:56:26,012:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:56:26,012:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:56:26 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "easjjt1YYbg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-11 06:56:26,013:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:56:31,384:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8426_key-certbot.pem 2024-09-11 06:56:36,571:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8424_csr-certbot.pem 2024-09-11 06:56:36,572:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:56:36,572:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:56:36,747:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:56:36,748:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:56:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnw9BFdlPVUvL9lJtVfS6hUTHEH_hNWKge9KPTqzB3nc0w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:56:36,748:DEBUG:acme.client:Storing nonce: UAMvsxnw9BFdlPVUvL9lJtVfS6hUTHEH_hNWKge9KPTqzB3nc0w 2024-09-11 06:56:36,748:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:56:36,754:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bnc5QkZkbFBWVXZMOWxKdFZmUzZoVVRIRUhfaE5XS2dlOUtQVHF6QjNuYzB3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "H9gTiKnGXBwr5TiRUzLcbuSTo_RHmqw68zV3lhcAzWBjC7pZsuLCGI83KfLKlrnkzOrAxeUQyrOSNSHhu2MdesYG4Tzj5gKsYVrsHkmmpMJqWHpxE2S6MmLb2J1VxaEo_cPWq3VawSg_4euRBvpYXiXNJCr7ccqYnMsXhTW1mNfrc0qxA-vW5r8Ag9Yodckc1WXLzfft_6MRWFeKONvuJ30oI0WREs6xJW-0eumxaSep-xRLGbtWa4dWDSLjRbmZpivcoEV5t2FzzhZjzrmNSgkzkZYfcT7NSLaQQLyy18DCJ2FerOmAR5y9VAXubQJlfG9NlaNQZp3Y9jcremdpYw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-09-11 06:56:37,016:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-09-11 06:56:37,017:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:56:37 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145193816 Replay-Nonce: 0Nvv4YStNhAu0F0tIipH_R7MJhrPE85g3EGm2A3AIjAwFYjufd8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:37Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145193816" } 2024-09-11 06:56:37,017:DEBUG:acme.client:Storing nonce: 0Nvv4YStNhAu0F0tIipH_R7MJhrPE85g3EGm2A3AIjAwFYjufd8 2024-09-11 06:56:37,017:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:56:37,023:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123173286: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3ROaEF1MEYwdElpcEhfUjdNSmhyUEU4NWczRUdtMkEzQUlqQXdGWWp1ZmQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMxNzMyODYifQ", "signature": "Bg75ewhvwPKswdmThqqgjvj3KLeYRj3Ay-vHEq-3FwYP9fqUvdMQ41NUZYfEVZwGy4P7Tn9I4M-gWAkVQXLbNRJB_FPvvV0WVghEqHYPywGbHGymFuwR_OHY5CX3_ncGtphh3wZO56P9arm9m8YEeDyEwmtYxHQZ3yEbMQg-73KKNoNwpygg4A4arQKVglDOqARE9ekN26aqME1TVtxBt0Kqq2kjo5guKfBGnNO5k2o1RBmqSZAVxiiK_Wown62Cc_tDFXYflxC9okwFfgEPkEHuYVsZrSuD3QA5RszM-qg6QFm5y-D7H-NY-XljnuTSq9HRvt6rpyztPT7qPS3Egg", "payload": "" } 2024-09-11 06:56:37,202:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123173286 HTTP/1.1" 200 809 2024-09-11 06:56:37,203:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:56:37 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwEJy7XR_o3szhXhtrJ6v5Vbf9Muv1Xlo_KhntKXDtY8E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:37Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/QeJIqg", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/S6yiLg", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123173286/xZ9qpw", "status": "pending", "token": "bVYNyYqdyQEYf8LwZWpesEyqRqnQw2wg-m0ISiJJWi4" } ] } 2024-09-11 06:56:37,203:DEBUG:acme.client:Storing nonce: UAMvsxnwEJy7XR_o3szhXhtrJ6v5Vbf9Muv1Xlo_KhntKXDtY8E 2024-09-11 06:56:37,203:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:56:37,204:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-09-11 06:56:37,204:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:56:37,204:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:56:37,205:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:56:37,205:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:56:37,205:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:56:37,206:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:56:37,207:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:56:37,256:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-11 06:56:37,492:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:56:37,493:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-09-11 06:56:37,493:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-09-11 06:56:37,498:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:37:57 UTC. 2024-09-11 06:56:37,498:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:56:37,498:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:56:37,504:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:56:37,504:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:56:37,504:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:56:37,508:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:56:37,509:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:56:37,511:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:56:38,032:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:56:38,032:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:56:38 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "STruqdJXo48": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-11 06:56:38,033:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:56:43,623:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8427_key-certbot.pem 2024-09-11 06:56:48,935:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8425_csr-certbot.pem 2024-09-11 06:56:48,935:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:56:48,935:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:56:49,110:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:56:49,111:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:56:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStxqiXULPSXB2vAtXBy25L4oNclMEewMab-Ui8HZ2jcFM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:56:49,111:DEBUG:acme.client:Storing nonce: 0Nvv4YStxqiXULPSXB2vAtXBy25L4oNclMEewMab-Ui8HZ2jcFM 2024-09-11 06:56:49,111:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:56:49,117:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3R4cWlYVUxQU1hCMnZBdFhCeTI1TDRvTmNsTUVld01hYi1VaThIWjJqY0ZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tI5Brl1FnwwJBzoksDeiJm7-wlvDQr_PRvcZZcIdvqbP_D69GgjxqEF3pyC3DRVAM4jrYefjMbNM3fvmZk0YS6bYAE_On6bjwdnuNtuoTGrF6YdQlAsTN9h_U2GsxmuwaWlYGoJ7ASvKEy45a0Xeksm16_rZ2vJm7FPkyOoYzmy6pKRu4moUB4pA-B5HXBwsRJGPrXI6WuaEnm4MLkeEfuCqp8A3WvnrFuNl7niB-fQgcAXFAt5W27ol8tvG-Jvph6NI4R6_JgObFowNKBdjC4NGmPLaBVC1e1njo_L_edtps6BmKz1Q6Naz-VhUoworT1SaLGY_kLnPINE2HddxaA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-11 06:56:49,375:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-11 06:56:49,376:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:56:49 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145229456 Replay-Nonce: UAMvsxnwCrU8tfBNdcSfeHnwMIqd5Xh4JTDEgtwc2ZCNjY2Pwcg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:56:49Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145229456" } 2024-09-11 06:56:49,376:DEBUG:acme.client:Storing nonce: UAMvsxnwCrU8tfBNdcSfeHnwMIqd5Xh4JTDEgtwc2ZCNjY2Pwcg 2024-09-11 06:56:49,376:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:56:49,382:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123229506: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndDclU4dGZCTmRjU2ZlSG53TUlxZDVYaDRKVERFZ3R3YzJaQ05qWTJQd2NnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyMjk1MDYifQ", "signature": "J6zGduRGc6jB2rzfHOTJcMNyUCqC7ketWCO-Ach8VpivRMjy36vGPjfCPzj0xcJ4SIIF8PUWhpwMJt-TQiJ2avCDnY-dPWGILUeza_lIC8HL2jAExh_OiaCey8JsoQncW6LXjHyE7f1u75EUKAnR0SZIxYrjI1VlUXDY8nCpVGhk9V9AldaICy7fGot6xBSMvJ-pdo8JvIjXoRkk1kRDapjxpzKRfUf70o4K1VmZ1N8Y0g2cD59pzdD00N4_WITCTxpIf9TNpI0GfsqrshbM3QkVfKhDLDXNPg1iVwppl4erjkpm0PJM4vAa8fmVocPh_bpM14n53ZZTfKnbOqIMeA", "payload": "" } 2024-09-11 06:56:49,561:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123229506 HTTP/1.1" 200 805 2024-09-11 06:56:49,562:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:56:49 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YSto-mUdQsMhfVSLDPsqg9ESgiqcBBL1SFT29xm7NENYT0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:56:49Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/yzBBsQ", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/gbt7DA", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123229506/K5UDEQ", "status": "pending", "token": "hvOEWnNj9x7uVNxZvfhnRal_s0pHxQQWREKKgIDpqDA" } ] } 2024-09-11 06:56:49,562:DEBUG:acme.client:Storing nonce: 0Nvv4YSto-mUdQsMhfVSLDPsqg9ESgiqcBBL1SFT29xm7NENYT0 2024-09-11 06:56:49,563:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:56:49,563:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-09-11 06:56:49,563:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:56:49,563:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:56:49,564:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:56:49,564:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:56:49,564:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:56:49,564:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:56:49,565:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:56:49,604:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-11 06:56:50,024:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:56:50,025:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2024-09-11 06:56:50,026:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2024-09-11 06:56:50,030:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:15 UTC. 2024-09-11 06:56:50,031:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:56:50,031:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:56:50,036:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:56:50,036:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:56:50,036:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:56:50,041:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:56:50,041:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:56:50,043:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:56:50,565:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:56:50,565:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:56:50 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5YIpbBBTcpI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-09-11 06:56:50,566:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:56:55,914:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8428_key-certbot.pem 2024-09-11 06:57:01,111:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8426_csr-certbot.pem 2024-09-11 06:57:01,112:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:57:01,112:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:57:01,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:57:01,287:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:57:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UAMvsxnwopefvFTbLhv80lTSR5IBQwd_lrrrlPJfGOWvaEn3F8w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:57:01,287:DEBUG:acme.client:Storing nonce: UAMvsxnwopefvFTbLhv80lTSR5IBQwd_lrrrlPJfGOWvaEn3F8w 2024-09-11 06:57:01,287:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:57:01,294:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVUFNdnN4bndvcGVmdkZUYkxodjgwbFRTUjVJQlF3ZF9scnJybFBKZkdPV3ZhRW4zRjh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DGH3yuahc5p-pTp_C8dlnr8P_YHUZrXr7b8uIHINMxOVtW46CFeYLrB3gDsvJRLG3XOiSyYjc1cTNAoITgutH6n-kyjN7HpBATylH3xVg38k-ll5lW0Kqbh9nc6BsaWtvgHKl4HmLESM9AR6qn1ma_KoNEh51goHeBK3gg3QKHBF2hPbhlrJfpW5DwOFopL89vihhpLsajSw4plEH3SJ7_g0Z_-O9iyi_7h-xPsiRjhU0PoRzoUCaZi3oMbYOIlc5LHQj-XdUwxmsGAQE0qc0swZT2K0AeI27c-RUWo8Hx0_0UqiGDrKiA6sKIMFl2iknh_YgBMKrFQjzD0jNWLNhA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-11 06:57:01,562:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-11 06:57:01,563:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:57:01 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145265276 Replay-Nonce: 0Nvv4YStzagDz46qVMAXiwUn693CUP9Bfanv7ZLGfURRzfKltGc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:57:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145265276" } 2024-09-11 06:57:01,563:DEBUG:acme.client:Storing nonce: 0Nvv4YStzagDz46qVMAXiwUn693CUP9Bfanv7ZLGfURRzfKltGc 2024-09-11 06:57:01,563:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:57:01,569:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123286586: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiME52djRZU3R6YWdEejQ2cVZNQVhpd1VuNjkzQ1VQOUJmYW52N1pMR2ZVUlJ6ZktsdEdjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMyODY1ODYifQ", "signature": "LqZhjWz6BOJNa8uuTqsOI5OsM71Dp4FvdYmhiZEA8hB9UVSUn_Crkv9uq86YSdQ0tKejnccmU9G_eIUvd-OGCZYvfWPuWSsg9lySU42_wWaUZl5O58fkDChfBUEzS9FXgb6dwY1iJMSOaHzAM0lm6hCn80YJmrMXDKaX7r2wC_duUzflBp_6G_Whe4iOb2gFHTTzxS1nRF90gvFsaZSI5FcmBnH3IFpkZFGheUYWzjzMTx91Qa7YLpELF-7gx5uG89932DF4Z4f_X7sDB_IPyfn6pveyOXRy8Rr8S54SZgxisNzBKf6nKb8E6GVz4I5iJwAW8KDfzP33YsUmvVPYkw", "payload": "" } 2024-09-11 06:57:01,751:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123286586 HTTP/1.1" 200 805 2024-09-11 06:57:01,752:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:57:02 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0Nvv4YStp7zNy23xtSqj-K4Y3ab_c7agByMTi3LdtcRAmqFK67Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:57:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/S9gNtg", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/dinKKw", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123286586/B20YQg", "status": "pending", "token": "5xtkBjQ3P6-w0S3Oj-NeudjtoXd8CRi8q5QZPKvr8KU" } ] } 2024-09-11 06:57:01,752:DEBUG:acme.client:Storing nonce: 0Nvv4YStp7zNy23xtSqj-K4Y3ab_c7agByMTi3LdtcRAmqFK67Q 2024-09-11 06:57:01,752:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:57:01,753:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-09-11 06:57:01,753:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:57:01,754:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:57:01,754:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:57:01,754:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:57:01,755:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:57:01,755:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:57:01,756:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:57:01,804:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-09-11 06:57:02,057:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-09-11 06:57:02,058:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-09-11 06:57:02,059:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-09-11 06:57:02,063:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-10-10 23:38:30 UTC. 2024-09-11 06:57:02,064:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-09-11 06:57:02,064:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-09-11 06:57:02,069:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-09-11 06:57:02,069:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-09-11 06:57:02,069:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-09-11 06:57:02,074:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-09-11 06:57:02,075:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-09-11 06:57:02,077:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-09-11 06:57:02,527:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-09-11 06:57:02,527:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:57:02 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "zwpAbwPRyPg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-09-11 06:57:02,528:INFO:certbot._internal.main:Renewing an existing certificate 2024-09-11 06:57:07,990:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8429_key-certbot.pem 2024-09-11 06:57:13,181:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8427_csr-certbot.pem 2024-09-11 06:57:13,182:DEBUG:acme.client:Requesting fresh nonce 2024-09-11 06:57:13,182:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-09-11 06:57:13,346:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-09-11 06:57:13,346:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:57:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fCBw7MtQCENCZCILQFpJabEShCllyq2cnstNoSCOEg3yxf8or0w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-09-11 06:57:13,347:DEBUG:acme.client:Storing nonce: fCBw7MtQCENCZCILQFpJabEShCllyq2cnstNoSCOEg3yxf8or0w 2024-09-11 06:57:13,347:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-09-11 06:57:13,353:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFDRU5DWkNJTFFGcEphYkVTaENsbHlxMmNuc3ROb1NDT0VnM3l4ZjhvcjB3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XSpHvj_KUxBBBavdB3aQAERMIlIK7dYWm6AnMCYglOPfNpc-9KX1D4V0P_8PkRnukAccjM4QposRfRGJ_LhkjmGq-3Jip2Fssgtm_1YxP9x1zZJn9MCONN4WCVcdCcbC3aYl18FeyIjQZgye4EbYHSpChMWw3nPn8s1GdJoZpC3o49Sb8gt7KZTvjVnTUh-iQ4z8vOPpXMvIOgz33OX8v2gmcAPL6BRQEN3FE32uLuRIKH88tr3eNP8nZqguPiDEs-k-nyltKsFR44xA0m6ZmdsTGz_OjYg7uKroKdBGzDI3krqc-Dhb58VPVSDcItHr1OeA7EJEF4xUMjxT2USxYg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-09-11 06:57:15,003:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-09-11 06:57:15,003:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 11 Sep 2024 04:57:15 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/304145319296 Replay-Nonce: fCBw7MtQcj44XTVhTqunRoVo6nNtb2NKfCZFnKHPf4reJQ3WVgI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-09-18T04:57:14Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/304145319296" } 2024-09-11 06:57:15,004:DEBUG:acme.client:Storing nonce: fCBw7MtQcj44XTVhTqunRoVo6nNtb2NKfCZFnKHPf4reJQ3WVgI 2024-09-11 06:57:15,004:DEBUG:acme.client:JWS payload: b'' 2024-09-11 06:57:15,010:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/402123364606: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkNCdzdNdFFjajQ0WFRWaFRxdW5Sb1ZvNm5OdGIyTktmQ1pGbktIUGY0cmVKUTNXVmdJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My80MDIxMjMzNjQ2MDYifQ", "signature": "A7wfuOUmxZKE72Fkt1y-V3JzivXgsICMLhRbxTuLYci1sPyi326BAzQ_ENXG85j0VEykaZkbykdnmiHKYRs4DDTzo2iTKmJmv8fR_D8e7A8LJ1FtboteG6_wjSmTcA8hPGBK6fJ9kuuPCKTwq4r6wbIPy5IazQSzbiQWwi-nfkLISQvxzrWv3u6EesNKrIEOei6LXwzTf-L6_uk4JcYnxYuQOd0TfD1m3CEN3dI_Z9iyA2-N0dmv1jwRruqJnGlkeIjPhBlMU6wpM4sEvFZNthWvw9NVXonQYIgx5gBHCFL8GUn_SjhLBJE6cEfoosBp4vLTAVCRAYc6wOv4qSWSBg", "payload": "" } 2024-09-11 06:57:15,293:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/402123364606 HTTP/1.1" 200 805 2024-09-11 06:57:15,294:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 11 Sep 2024 04:57:15 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4OmWUlyUZFgByCed3HAyxrYyVHCvcYcD4tkdYfxdQfNzQBotM3o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-09-18T04:57:14Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/LOiTWA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/DMnfUA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/402123364606/ndw7tA", "status": "pending", "token": "sTS9rvO_SCTUTjWRnms4wgHJxDRjrQbDlZlMjG8RNqw" } ] } 2024-09-11 06:57:15,294:DEBUG:acme.client:Storing nonce: 4OmWUlyUZFgByCed3HAyxrYyVHCvcYcD4tkdYfxdQfNzQBotM3o 2024-09-11 06:57:15,294:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-09-11 06:57:15,295:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-09-11 06:57:15,295:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-09-11 06:57:15,296:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-09-11 06:57:15,296:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:57:15,297:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-09-11 06:57:15,297:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-09-11 06:57:15,297:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-09-11 06:57:15,298:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-09-11 06:57:15,299:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-09-11 06:57:15,299:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-09-11 06:57:15,300:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-09-11 06:57:15,301:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)