2024-07-12 22:02:39,593:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-12 22:02:39,593:DEBUG:certbot._internal.main:Arguments: [] 2024-07-12 22:02:39,593:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-12 22:02:40,485:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-12 22:02:40,485:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-12 22:02:40,525:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-07-12 22:02:40,568:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:02:40,945:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:02:40,948:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-12 22:02:40,955:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-12 22:02:40,963:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-12 22:02:40,964:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:02:40,964:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:02:40,969:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:02:40,969:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:02:40,969:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:02:40,975:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:02:40,976:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:02:40,979:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:02:41,485:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:02:41,487:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:02:37 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CE-Tb0dwP-U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 22:02:41,488:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:02:46,889:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8387_key-certbot.pem 2024-07-12 22:02:51,923:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8385_csr-certbot.pem 2024-07-12 22:02:51,923:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:02:51,923:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:02:52,086:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:02:52,088:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:02:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdxntCGTbJMsvSy5hdGJB-MGHWJ1vosNYOiQDUP5MEPAs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:02:52,088:DEBUG:acme.client:Storing nonce: 9v6OBnJdxntCGTbJMsvSy5hdGJB-MGHWJ1vosNYOiQDUP5MEPAs 2024-07-12 22:02:52,089:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:02:52,100:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOXY2T0JuSmR4bnRDR1RiSk1zdlN5NWhkR0pCLU1HSFdKMXZvc05ZT2lRRFVQNU1FUEFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QJZNSqEKU8ebMw6f-_WjLVBvk0OctiWBFX1ygru2QU4xqzNJfqJjEU5qfGEqewvn_5Tj5P2CJbGw118ClCKvlSZNajzv1WL3KXv_qvifAsui-h6ixusyILADYYkGHUSGLzFCB7_elxWd15fRmd_GrJ9qGdibF19-QKkSc2OclhM6g0ocwAOeaTim8qz9OndqkHV29BgQKSxMRu22-UrWkJWK6Rge2tIXxzWHp857MWi8jNf700nIgSi3R8W_T39MliBNUK5Avcqm6w_RmC2Zg26q_0pFct2zYDezrCeR3HYcqNTBk8p6TL8YLbvJIXt7F1nZ0Z5q5INUwvTEZSnxJw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-12 22:02:52,293:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-12 22:02:52,294:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:02:48 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042282867 Replay-Nonce: XrsdoYfrEmwUsqAc5EtvsIgbbJzrAVS-PMNnREHOG8Dp5C_EtE4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:36Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182938057" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042282867" } 2024-07-12 22:02:52,295:DEBUG:acme.client:Storing nonce: XrsdoYfrEmwUsqAc5EtvsIgbbJzrAVS-PMNnREHOG8Dp5C_EtE4 2024-07-12 22:02:52,295:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:02:52,308:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182938057: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJFbXdVc3FBYzVFdHZzSWdiYkp6ckFWUy1QTU5uUkVIT0c4RHA1Q19FdEU0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODI5MzgwNTcifQ", "signature": "EIoauMwZTVwSpHQ_0ZFJIyyqhqzmStmkiuP1E6dUivWmcqSyM5MLXgF-Vx1l1IVsQxn89LxGkQf2D2-oJUSkT_nviIO6MKKVjoEPFEtZnZWd1mkU7ENqD5dh00GR-jRc0eVBLKcCilU5U4mn-wKPjFOfq4a7Z-SaU6jruI_QBuf4t7piDMuQB4xdOcaF4GktgRMPWLUnkqlBrPn8aeBO9-uiWQkvIzKGh6SRtJUUpSekk2Sr2_10xF3_kNFQpaTsPCxoRviEP4z9rDzJFpnXgAEv7f6w69Xyhrh0KczD1k6NKpeXYlmqk4NeqxPDhnGgrG-MMKkrGQEyjFHCwoDa5g", "payload": "" } 2024-07-12 22:02:52,490:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375182938057 HTTP/1.1" 200 810 2024-07-12 22:02:52,492:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:02:48 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfrBC5Qt_A9D_gmeHxU4YUkH4WzfzO90GMtFuUWHCEQKaw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:36Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/gtbErw", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/uhlVRg", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/KhzwYg", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" } ] } 2024-07-12 22:02:52,492:DEBUG:acme.client:Storing nonce: XrsdoYfrBC5Qt_A9D_gmeHxU4YUkH4WzfzO90GMtFuUWHCEQKaw 2024-07-12 22:02:52,494:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:02:52,494:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-12 22:02:52,495:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:02:52,496:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:02:52,511:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:02:52,511:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:02:52,511:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:02:52,511:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:02:52,517:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:02:52,560:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:02:52,779:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:02:52,780:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 22:02:52,781:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 22:02:52,786:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-12 22:02:52,786:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:02:52,786:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:02:52,791:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:02:52,791:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:02:52,792:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:02:52,807:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:02:52,808:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:02:52,811:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:02:53,252:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:02:53,253:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:02:49 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_WgsICYHtmo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 22:02:53,253:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:02:58,309:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8388_key-certbot.pem 2024-07-12 22:03:03,047:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8386_csr-certbot.pem 2024-07-12 22:03:03,048:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:03:03,048:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:03:03,197:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:03:03,198:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:02:59 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR2FWPMhHCp1awJTd6zGsdkSrcePqEVaINCAb3h-tQjGVM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:03:03,198:DEBUG:acme.client:Storing nonce: _jAl9GR2FWPMhHCp1awJTd6zGsdkSrcePqEVaINCAb3h-tQjGVM 2024-07-12 22:03:03,199:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:03:03,205:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiX2pBbDlHUjJGV1BNaEhDcDFhd0pUZDZ6R3Nka1NyY2VQcUVWYUlOQ0FiM2gtdFFqR1ZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "q9UDDOoMk72Q3Yx_iKYlsc9wlWCEhT8RnKGjtT3bUz2oXloj0gegVdBfg_Bp3SdkRP-HCZDGmHdW0Kel6ayzbe2dUyBM3HdZNdXaYZC8gTtrrKTu17btliEzM3z6TdUCCegW2yjYxOw22Bc7njBrtt4XzvxE1tKE2Jt_yght_gbpE6Nzas8Xmn0cP2TK-Lyfr7htGYSIqDYuytRgM9oOMUJZIkyG8hGe620cusxRA7zbV4Yz-u4vZgiJYatc50B6_mZbHKolkOWKcWMpT64qJSvObHHsoOUFgmYLj2IQ-5l4qg74lr5vOkwG6wy36pzbvlEYa50WSBPDOf_o1qhD5A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-12 22:03:03,389:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-12 22:03:03,391:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:02:59 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042319787 Replay-Nonce: _jAl9GR2WN0pIh5XPRo4YCpQ3ojgENIj5RSUXdNwuyn6FS5H-bo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:48Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182994777" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042319787" } 2024-07-12 22:03:03,391:DEBUG:acme.client:Storing nonce: _jAl9GR2WN0pIh5XPRo4YCpQ3ojgENIj5RSUXdNwuyn6FS5H-bo 2024-07-12 22:03:03,392:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:03:03,398:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182994777: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiX2pBbDlHUjJXTjBwSWg1WFBSbzRZQ3BRM29qZ0VOSWo1UlNVWGROd3V5bjZGUzVILWJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODI5OTQ3NzcifQ", "signature": "qiO20N0xHRExkHXOe8lS0ecibMAf8oTxgvnakqmkQSj9XrTM_aF26FMl7DnSAjWrzISJaFL1jWkr2gpgVjecFf0dRSzyidsRfpyHxZDpd2SvII17CgA7Z0wq4Vq-Z28U-ANZQ_pHwM6tCRer0Z6GzQiqTY9MpshyeMr4BkeopWmhcBzVidFHEcX9NGARW1bTZC9BNYFUoh0p6got6cCEGWGzPp0nwlhXsW1NPNwloNungJP75pVXsuqdr-VJ5Fk1bIugULZUY1u5PsEy3fcOckQiy4mpYEispRvrvmz8oVF1vx6rWRhCNO78PEwmKHHz6__Y7aqXirGunc22jBWnBA", "payload": "" } 2024-07-12 22:03:03,549:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375182994777 HTTP/1.1" 200 804 2024-07-12 22:03:03,551:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:02:59 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR2iYVbiLeNULjywic0hey5KFbnw2_pLA709ng2QZz-TyM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:48Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/Qwv2DQ", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/7TjcFQ", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/hJdTTw", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" } ] } 2024-07-12 22:03:03,551:DEBUG:acme.client:Storing nonce: _jAl9GR2iYVbiLeNULjywic0hey5KFbnw2_pLA709ng2QZz-TyM 2024-07-12 22:03:03,553:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:03:03,553:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-12 22:03:03,554:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:03:03,554:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:03:03,556:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:03:03,557:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:03:03,557:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:03:03,558:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:03:03,559:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:03:03,601:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:03:03,889:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:03:03,890:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-12 22:03:03,891:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-12 22:03:03,896:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-12 22:03:03,896:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:03:03,897:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:03:03,905:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:03:03,905:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:03:03,905:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:03:03,910:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:03:03,911:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:03:03,913:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:03:04,408:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:03:04,409:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:00 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Xpak4Zl70XU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 22:03:04,410:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:03:09,422:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8389_key-certbot.pem 2024-07-12 22:03:14,253:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8387_csr-certbot.pem 2024-07-12 22:03:14,254:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:03:14,254:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:03:14,415:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:03:14,416:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfr6uqAVc1Pi1UAbO6jFH_GERlykqTd-E4T0R-_UUxos_Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:03:14,416:DEBUG:acme.client:Storing nonce: XrsdoYfr6uqAVc1Pi1UAbO6jFH_GERlykqTd-E4T0R-_UUxos_Q 2024-07-12 22:03:14,417:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:03:14,423:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnI2dXFBVmMxUGkxVUFiTzZqRkhfR0VSbHlrcVRkLUU0VDBSLV9VVXhvc19RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Oz4oq1D3tQTdNtkYjUPkS46F3wm75YVNUF3Sl7fe-vqIOm9POSmTX9WgRT6cD8MSH9xxssnMtUn7rWbycE4JS8g8EcPygCyb7Tl5IiGauEC6XM4RAVCahTZ-bb-pzTdBiskY7QKdw4WNsi_2xM8FvrHX28U_P-p_D3x1coqCDBN005h3plI1Ge0TBn2tVaU70og0xCF4uHrtS6tou9EKnb6Py-KysaoO9JLpRHj7KQYbOtwqtPFeZFHKq1N2BjTWwIo0Z-LzfTVGSVshBuGRvgPXe_nXj8HSlxID0AI9Xis-bDCPTjCGZT67cmsqG43FtLH1A7zlja1D5phsIWLBXw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-12 22:03:14,611:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-12 22:03:14,611:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:03:10 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042354327 Replay-Nonce: XrsdoYfrVP22X8D3S3qfIfyXBUIT1bRND-Z9C_B2td1XadW5SJQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:59Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183044847" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042354327" } 2024-07-12 22:03:14,611:DEBUG:acme.client:Storing nonce: XrsdoYfrVP22X8D3S3qfIfyXBUIT1bRND-Z9C_B2td1XadW5SJQ 2024-07-12 22:03:14,612:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:03:14,618:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183044847: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJWUDIyWDhEM1MzcWZJZnlYQlVJVDFiUk5ELVo5Q19CMnRkMVhhZFc1U0pRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMwNDQ4NDcifQ", "signature": "JmLq3hUJTc_aSRJ8X83IxZ2AU7cJNZPBGmx38MdcxRyfL_CKWIbUGDW7sYJwRxwRY2qFygBVILpKvY5QMFa2J-oKNgLLi75S8hNoDPxG6Fwh2G9MMB1MdSP2TLWre-BizQgPCODb23_NulngvfxKPuK5JopTKkJYelJ7SbAxn6yK74JQROvaJBiiA8w_kKlnmKlAUNOEk23wE9uumOV6DDAnl2ElfBDNCnaI0dr0yrMZotRV11d3ybva1-io7Rn7qkfeUiIA9rEPEX5G7WHlupMsrNUeXeMnAqzNKnCiYl6VRv-S7pox_NIhIxunJe8YzpBkv5T5Di9mYgdODU2tuA", "payload": "" } 2024-07-12 22:03:14,792:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183044847 HTTP/1.1" 200 807 2024-07-12 22:03:14,793:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:10 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJd7sg52BJZrXaTY14AMxX976ahnWqixVnIzykxP4o4TxU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/MqkCfA", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/OGQ48g", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/eU6s8Q", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" } ] } 2024-07-12 22:03:14,793:DEBUG:acme.client:Storing nonce: 9v6OBnJd7sg52BJZrXaTY14AMxX976ahnWqixVnIzykxP4o4TxU 2024-07-12 22:03:14,794:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:03:14,794:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-12 22:03:14,795:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:03:14,795:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:03:14,796:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:03:14,796:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:03:14,796:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:03:14,797:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:03:14,798:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:03:14,839:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:03:15,074:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:03:15,076:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 22:03:15,078:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 22:03:15,083:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-12 22:03:15,083:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:03:15,083:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:03:15,088:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:03:15,088:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:03:15,089:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:03:15,093:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:03:15,094:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:03:15,096:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:03:15,544:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:03:15,546:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:11 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7JXDDNy7pTs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 22:03:15,547:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:03:20,752:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8390_key-certbot.pem 2024-07-12 22:03:25,624:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8388_csr-certbot.pem 2024-07-12 22:03:25,624:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:03:25,624:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:03:25,771:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:03:25,772:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR25ADuedK-jXp8LONVCgrKgxu8NrKUpVs_dLw_Vfp5XxU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:03:25,772:DEBUG:acme.client:Storing nonce: _jAl9GR25ADuedK-jXp8LONVCgrKgxu8NrKUpVs_dLw_Vfp5XxU 2024-07-12 22:03:25,773:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:03:25,779:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiX2pBbDlHUjI1QUR1ZWRLLWpYcDhMT05WQ2dyS2d4dThOcktVcFZzX2RMd19WZnA1WHhVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "n95Tmk2XhFV29wI-6-plMqb8XYf1oMl2Uun2WjrzlAEg4Ba7N2UQyPQIFYEn5-_CZIcFso6I-ny0d2cRUtbcZWupB2zXclvwLvgZ2C1j6XgvNr1Lyg2iNNC3y44FJW-eEUSAtomXyQ8sI-LNQP_rRpL1Z2bHK5oI9bTMruPXZ_NZx-lCvp-3dnGwO1LgXsJprlc3tZ_pf0FqHncuwWD1p_UhO1WacgqIQwvl4JJ5of3P5qK2sPfonmOm0c0yycTonOUy9ZGMvvoyAsag2Qh9r_I9y0O68bLd4iHVEHr9kGRjUC05ZZKchatP21C_GI2w3blwitskI2cnADADVonTuw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-12 22:03:25,954:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-12 22:03:25,955:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:03:21 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042400737 Replay-Nonce: _jAl9GR2hUALiUxx7H6ubDxv_zpun4Q7rFtPtMJiqcCwkd0bGuI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:10Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183108237" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042400737" } 2024-07-12 22:03:25,956:DEBUG:acme.client:Storing nonce: _jAl9GR2hUALiUxx7H6ubDxv_zpun4Q7rFtPtMJiqcCwkd0bGuI 2024-07-12 22:03:25,956:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:03:25,969:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183108237: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiX2pBbDlHUjJoVUFMaVV4eDdINnViRHh2X3pwdW40UTdyRnRQdE1KaXFjQ3drZDBiR3VJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMxMDgyMzcifQ", "signature": "aCbtKV0eRCiHchrJdH-829pdEgIsYQnoAxdb2IQExdW1L8pF2fIqhL-L4E2f4q7lxs-LUJ5xqWgHDGxTTimxKWTnPFKYgnQHMhEeJnJSTSY7Falm_oD9ELcxgPgZt33Bw9PsPkeXiTUQCVvhUG67BYjf_ceKURS3IbWJhdz5SxDhL8Pjgd_6-n_W2bSSGD4y4DdmurCv6cxZajTfqQbiy7myiJwDs6wEa6wlYrFb-oUIPPtA51MILjY9cP7gInhYe-LGfG6m4F9L7LE1dofuA-DFODKTlBhi3AryoKYwdgm2RvPpRd-_7UvjGaUnYnVeETum6A03z_F4DMDXdS25qA", "payload": "" } 2024-07-12 22:03:26,121:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183108237 HTTP/1.1" 200 801 2024-07-12 22:03:26,122:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:21 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0HjY_nENiS5MLQQOMmvlDSp3hkvG4URq8kOUVfZiLmbcf5UzANY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:10Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/2jPgJg", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/MtdTdg", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/1H2g1Q", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" } ] } 2024-07-12 22:03:26,123:DEBUG:acme.client:Storing nonce: 0HjY_nENiS5MLQQOMmvlDSp3hkvG4URq8kOUVfZiLmbcf5UzANY 2024-07-12 22:03:26,124:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:03:26,124:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-12 22:03:26,125:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:03:26,125:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:03:26,127:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:03:26,127:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:03:26,128:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:03:26,129:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:03:26,131:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:03:26,192:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:03:26,499:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:03:26,501:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 22:03:26,501:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 22:03:26,506:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-12 22:03:26,506:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:03:26,507:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:03:26,513:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:03:26,513:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:03:26,514:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:03:26,530:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:03:26,531:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:03:26,533:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:03:26,971:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:03:26,972:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:22 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "zsG9d8BTiC8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-12 22:03:26,973:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:03:32,317:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8391_key-certbot.pem 2024-07-12 22:03:37,185:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8389_csr-certbot.pem 2024-07-12 22:03:37,186:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:03:37,186:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:03:37,332:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:03:37,333:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR27X_aSar83QQAZQBtZGaBQvgus4FLFfAZND15Pd7KaSM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:03:37,333:DEBUG:acme.client:Storing nonce: _jAl9GR27X_aSar83QQAZQBtZGaBQvgus4FLFfAZND15Pd7KaSM 2024-07-12 22:03:37,333:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:03:37,340:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiX2pBbDlHUjI3WF9hU2FyODNRUUFaUUJ0WkdhQlF2Z3VzNEZMRmZBWk5EMTVQZDdLYVNNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jFw1ldRzuWwk6mo33sKp3RSefzRVBBCDsrqJjH1bDcaBeb7cNZ-9CmD1tLuBQTuw8HHlm_y69G5ivhUTqywzqlonzx0OlmFT340xP4JKx_YdycDsIaHxS8wtV3QJ-j7ew1q7PKpEzI5r4b35s4Bma1WcAz6yFWMT6AHysFTYAkgBurgRtzwT2j6nvytFuai0sSLfOoloQDR7Vf9pWWzTy1Ug_dGwh6l5kLqxkUMngptfbj3uUApepZlr3UHZmunYZtOG_F7HsXJNjkD45TASh3sSmC3oCravjfFBZynqJc8bi5W5VSJ4rHwNPusdL8lTX8RPPqevxtIxPSoNfZ6UQQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-12 22:03:37,500:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-12 22:03:37,501:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:03:33 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042441707 Replay-Nonce: 0HjY_nENsy5LOCE35lnaYsGd8dUNdTNoX5K9skGe5hteRazo4LQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:21Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183170507" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042441707" } 2024-07-12 22:03:37,501:DEBUG:acme.client:Storing nonce: 0HjY_nENsy5LOCE35lnaYsGd8dUNdTNoX5K9skGe5hteRazo4LQ 2024-07-12 22:03:37,501:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:03:37,507:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183170507: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU5zeTVMT0NFMzVsbmFZc0dkOGRVTmRUTm9YNUs5c2tHZTVodGVSYXpvNExRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMxNzA1MDcifQ", "signature": "FHslUIxW4iJPgqi5BTi_SqVYJGUta9tX5P3n3wahcTYb3VESkIB_QUCleQrEd5gRyhk97tKAuNJ6Vn5UMqkLiOvs-RunbeBto7CqVhgSDVlkyQpAjsRoR7eASCseeKGevP4JfDBXa1o1XKAdlducatd6XTz3lOD5YtWB1AF9QEtWup7kIi3bbUgE8IiHs8rPeF7PnbYFtOfUPu1HY8uP7lZyoPtL7d9aQpqpSMsIxETogAZN8psEAUK47ZuCkyI44HA-mf81kI3wqAlWrDQE9XAbUdKaOWFQIklb8Yq-kEk6wzROZylIQCZWb0OAs-Y6hm6QKNCNUF-MFqn2IA1gQw", "payload": "" } 2024-07-12 22:03:37,656:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183170507 HTTP/1.1" 200 805 2024-07-12 22:03:37,657:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:33 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0HjY_nENbbV0X7hyxdJJsBO6-r_yowS0ynFfWH0bsWMYgaSGS_s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/LCB2Ww", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/I9mxAw", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/UAlFYQ", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" } ] } 2024-07-12 22:03:37,658:DEBUG:acme.client:Storing nonce: 0HjY_nENbbV0X7hyxdJJsBO6-r_yowS0ynFfWH0bsWMYgaSGS_s 2024-07-12 22:03:37,659:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:03:37,660:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-12 22:03:37,661:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:03:37,661:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:03:37,663:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:03:37,663:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:03:37,664:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:03:37,664:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:03:37,667:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:03:37,728:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:03:38,019:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:03:38,020:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-12 22:03:38,021:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-12 22:03:38,025:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-12 22:03:38,026:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:03:38,027:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:03:38,032:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:03:38,032:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:03:38,033:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:03:38,037:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:03:38,038:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:03:38,040:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:03:38,487:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:03:38,488:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:34 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "JoYzw42NeAk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 22:03:38,489:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:03:43,688:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8392_key-certbot.pem 2024-07-12 22:03:48,519:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8390_csr-certbot.pem 2024-07-12 22:03:48,520:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:03:48,520:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:03:48,673:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:03:48,674:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR24hmxwB5_rEdkN6JnPXFKS0bk3pQxG1FvtujvMEIUngM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:03:48,674:DEBUG:acme.client:Storing nonce: _jAl9GR24hmxwB5_rEdkN6JnPXFKS0bk3pQxG1FvtujvMEIUngM 2024-07-12 22:03:48,674:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:03:48,681:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiX2pBbDlHUjI0aG14d0I1X3JFZGtONkpuUFhGS1MwYmszcFF4RzFGdnR1anZNRUlVbmdNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BqWQSzKAlrXa-A2hMvPzIenMXmel-0k-Q-4MDQWDCz0oCq0CK_RrAOrbPM3zMiEz0bL3LlEWyvxuNW1vBz5qaqq8TU-f6hQkLBR1Lkb7QAqerg6ZsjEirZhp4iKCKt_FXXpSyftWczz4rsark295feLkoOxpUKbU2DsDJJZSVDisGqhy7FGf3bk6MomxMfbnzCDOTM956Xe2rB3cRIIeKCM4gd_jfWpqHma-zk-0NDZMcTLo6wgUjngfQLFuEwZ4SHftMySj0qNuLHl_6fdfS9nvXBQb_XSUSXnsHLGTXvm5y54yJDWnz578sUOTO64ou-YMfW-yB2OKYiAULlRlfA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-12 22:03:48,880:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-12 22:03:48,881:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:03:44 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042480887 Replay-Nonce: 0HjY_nEN1bRMARnuSJ0pfk7jOrDCLBDvxKnvHRRWWfn5fVonixQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:32Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183227457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042480887" } 2024-07-12 22:03:48,881:DEBUG:acme.client:Storing nonce: 0HjY_nEN1bRMARnuSJ0pfk7jOrDCLBDvxKnvHRRWWfn5fVonixQ 2024-07-12 22:03:48,882:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:03:48,891:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183227457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU4xYlJNQVJudVNKMHBmazdqT3JEQ0xCRHZ4S252SFJSV1dmbjVmVm9uaXhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMyMjc0NTcifQ", "signature": "cJQQPLFSpJV1RNLF-x9AhuvGcCTIOg253FPdTeyFI-JJK23v5ZDNMRJ3Ivo9iqq6ZSR5or-94gSTxpgDO-N5Cq0te0boummh4lxMT5PkGG0XZ5f_iYL-r_FNyXAuUuRzZi3fJ1htlFLPTQ3JYHEIANFyMk7bv9np0jXZgyI82lt8p4gL9-mB49i7y1ybAqpaCU7ORelIAWjZPy7Im3AArwDp8PgbMyrnHm3JyHLPOhh2NCLLf8w0IkEAig-hsMe_ADDbJ6X17kIqtll_IQABz8uj088ghj31WG7T8LMYGrjk0LeJQiJDWuMSoIPixYPBKjv9yBL5jJZNYIxR0B6kLw", "payload": "" } 2024-07-12 22:03:49,048:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183227457 HTTP/1.1" 200 809 2024-07-12 22:03:49,049:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:44 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR2nAIWmgiTUWwFD4BYa1XjPz-viD6DjIgNCJNuXYVdAmM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/Us5Z1g", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/XssHxw", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/UVYPXQ", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" } ] } 2024-07-12 22:03:49,049:DEBUG:acme.client:Storing nonce: _jAl9GR2nAIWmgiTUWwFD4BYa1XjPz-viD6DjIgNCJNuXYVdAmM 2024-07-12 22:03:49,049:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:03:49,050:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-12 22:03:49,050:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:03:49,050:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:03:49,051:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:03:49,051:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:03:49,053:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:03:49,053:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:03:49,053:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:03:49,104:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:03:51,331:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:03:51,333:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-12 22:03:51,333:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-12 22:03:51,337:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-08-06 23:03:56 UTC. 2024-07-12 22:03:51,337:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:03:51,338:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:03:51,343:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:03:51,343:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:03:51,343:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:03:51,359:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:03:51,360:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:03:51,363:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:03:51,833:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:03:51,835:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:47 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "yJk0yKUP6hc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-12 22:03:51,836:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:03:56,828:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8393_key-certbot.pem 2024-07-12 22:04:01,619:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8391_csr-certbot.pem 2024-07-12 22:04:01,620:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:04:01,620:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:04:01,777:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:04:01,779:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdDeipoXb0NH1Nj4h_8Gjq8p-tStAsD7ZrOvzNWpiwP48 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:04:01,779:DEBUG:acme.client:Storing nonce: 9v6OBnJdDeipoXb0NH1Nj4h_8Gjq8p-tStAsD7ZrOvzNWpiwP48 2024-07-12 22:04:01,780:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:04:01,787:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOXY2T0JuSmREZWlwb1hiME5IMU5qNGhfOEdqcThwLXRTdEFzRDdack92ek5XcGl3UDQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "aazK_i3mR1Pk60SAucj5QnNbNGaPJx00fDSMHL9oo4YZccKXE7Df0WxmDZqk3Jqj5gejipkMdmqi3u-4zSqzZULIrywX63uaq9KGkPtOHTo1D9MMqgOF4o5hB52Bl0zbVz92wVZ_u1kEDdbhPtbiCF6SFDwgyJ5esukWyxmytDRuoqy4PuKoDfyzlUtAzq9sJu5CX1o4fpZ692sf_6TNuhyEDeaa2RjcCh52OOVZ5tUWnnzk04zbmHPiPe_57EukoBBL4GDoCAw85yaft_sqmu5E6OpA3OvFVeGrOj-xHE_feUj8jzVqtYBx0_xN2VFCmA9yEP3vzVNRzvVORzMrlA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-12 22:04:02,042:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-12 22:04:02,044:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:03:57 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/285341919627 Replay-Nonce: XrsdoYfrhoaFjNXyMIHKhPsagyjJMjkNndQzlDXBuTHg3bSuBuw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-15T04:13:07Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/285341919627" } 2024-07-12 22:04:02,045:DEBUG:acme.client:Storing nonce: XrsdoYfrhoaFjNXyMIHKhPsagyjJMjkNndQzlDXBuTHg3bSuBuw 2024-07-12 22:04:02,045:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:04:02,059:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJob2FGak5YeU1JSEtoUHNhZ3lqSk1qa05uZFF6bERYQnVUSGczYlN1QnV3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzQxNTAyMDI0NDcifQ", "signature": "nRIF7vTAbVzZxVk3qT4DYPKjyHmXZKzRRvm7Ov5yathN43fmqDqolbBuNrNjBrmopBOngUCA-_MuSrhwIPNpHXq0P150urIR5dgDspewdg24bVzYxYG5uIughlOKFQIallmMHNdjU76ESeKFeuIfxxB4mHoHqQGCMPORH9BNb7_JbUYNKn4Uo2uH79LSNjOQK89lmYhxWXxQV7stzNTRw1KzJvn5X6_u_WN7c2podueV58aZ5Oh2yqvgwNmxSsWox8I0MhKV_bxgIWssMDL5bX5VAIGK62ZGQyyjLUEaTWxJ06oF24iGKw1XHGVZsfp2zqumrxWtxYyYtej9hOd4Dg", "payload": "" } 2024-07-12 22:04:02,222:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/374150202447 HTTP/1.1" 200 807 2024-07-12 22:04:02,222:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:58 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfrU1whW57FtfMvrofoRpFoEo4SWy4DvcghgP7F65ybqT0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-15T04:13:07Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/NY8rUA", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/R0qBhg", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/2vSv0A", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" } ] } 2024-07-12 22:04:02,223:DEBUG:acme.client:Storing nonce: XrsdoYfrU1whW57FtfMvrofoRpFoEo4SWy4DvcghgP7F65ybqT0 2024-07-12 22:04:02,223:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:04:02,224:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-07-12 22:04:02,225:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:04:02,225:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:04:02,227:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:04:02,228:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:04:02,228:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:04:02,228:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:04:02,231:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:04:02,280:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:04:02,505:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:04:02,506:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 22:04:02,508:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 22:04:02,515:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-12 22:04:02,516:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:04:02,516:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:04:02,522:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:04:02,522:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:04:02,522:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:04:02,529:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:04:02,531:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:04:02,534:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:04:02,972:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:04:02,973:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:03:58 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "D0FBhF_ixDU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 22:04:02,973:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:04:07,824:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8394_key-certbot.pem 2024-07-12 22:04:12,637:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8392_csr-certbot.pem 2024-07-12 22:04:12,638:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:04:12,638:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:04:12,785:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:04:12,786:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0HjY_nENygAmKbZGukZe0HdkuUXLQD9elGfZxcFkDIgzNKb1IlU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:04:12,786:DEBUG:acme.client:Storing nonce: 0HjY_nENygAmKbZGukZe0HdkuUXLQD9elGfZxcFkDIgzNKb1IlU 2024-07-12 22:04:12,787:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:04:12,799:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU55Z0FtS2JaR3VrWmUwSGRrdVVYTFFEOWVsR2ZaeGNGa0RJZ3pOS2IxSWxVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EiZEDh-daB8sbcM9afH3CY_PxJQVnmuQgEG80HjBOZsrM_RaA7-dnI-9Rt3Jq4taxUq-bNByd1ja1Sc0J23NYw8kxrx6Y9I2IkgRKYwrfTjnhZa4KX1aKlMhUmssqSFNFandNo56F5j27tG3_6GeDQ3f-9al_u88UogPfSv9V8kqLZhvt8PLtdc3bAbmikEeZ5ZHfHplbzW_XFVK2lfVj9xtEioome3teHph0E_KnThAR1Wp0rp2Y7dKozaUeoyKBSXW_c4GH7RF_CE3z9U9Nt6CYXA23HZJGouxrB_qoyrirK0wh9sgMSWk1jouCPKPpmFwveF-HBmVnSTf47rbWA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-12 22:04:13,021:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-12 22:04:13,021:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:04:08 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042554147 Replay-Nonce: 0HjY_nENq-qZ12WuYRunM5k_jLgxW_NSmmf-vmxm1l1YXd40j_8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:54Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183336527" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042554147" } 2024-07-12 22:04:13,022:DEBUG:acme.client:Storing nonce: 0HjY_nENq-qZ12WuYRunM5k_jLgxW_NSmmf-vmxm1l1YXd40j_8 2024-07-12 22:04:13,022:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:04:13,028:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183336527: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU5xLXFaMTJXdVlSdW5NNWtfakxneFdfTlNtbWYtdm14bTFsMVlYZDQwal84IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMzMzY1MjcifQ", "signature": "c5dLzj1Z3wE0h2JhCgYo3-kaqZRa0bORwF-erFCf-i1Cn8YNIfcU6KDDYt7wtRMmyMJFiKqngYZrPH5SBo5g5-bqdLgNJFmTDiSN_PigrLR0RXnYJB1zhyEEhQsLDS7Exx6opZ5_uEYBFI5Op6hxUMoqaEWG2XfNt_D1cTGNMpUDOXuDtAY2__-C6gHAHj7rWZfYe2DgDfw3Z5NwszHaRt0XrlME1TqEBZHfksSBn9TuXIqjHq06gFuklVUirvYMdMo-3PuZqduW5aOVnhLBsEDkkI8W9V2Yc5QBPNMbJ0IWrgabwkp14uOCIXRp1xPOknL3zVJOD0NxD7rteFogQA", "payload": "" } 2024-07-12 22:04:13,179:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183336527 HTTP/1.1" 200 806 2024-07-12 22:04:13,181:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:08 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0HjY_nENEYOlEwkKk8wuqp_QnlfP1P2eY3Q6KedRBCvj8zmu1oc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:54Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/LtvPaA", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/uTcC3A", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/tbjSgg", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" } ] } 2024-07-12 22:04:13,181:DEBUG:acme.client:Storing nonce: 0HjY_nENEYOlEwkKk8wuqp_QnlfP1P2eY3Q6KedRBCvj8zmu1oc 2024-07-12 22:04:13,182:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:04:13,183:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-12 22:04:13,184:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:04:13,185:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:04:13,187:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:04:13,187:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:04:13,187:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:04:13,188:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:04:13,189:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:04:13,241:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-12 22:04:13,241:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:04:13,242:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-12 22:04:13,250:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-12 22:04:13,253:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-12 22:04:13,253:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-12 22:04:13,253:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-12 22:04:13,254:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-12 22:04:13,255:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-12 22:04:13,297:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:04:13,574:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:04:13,576:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 22:04:13,577:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 22:04:13,581:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-12 22:04:13,582:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:04:13,582:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:04:13,588:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:04:13,588:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:04:13,589:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:04:13,604:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:04:13,605:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:04:13,607:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:04:14,097:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:04:14,098:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:09 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HldQ4q7ups4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 22:04:14,099:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:04:19,119:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8395_key-certbot.pem 2024-07-12 22:04:23,830:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8393_csr-certbot.pem 2024-07-12 22:04:23,830:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:04:23,830:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:04:23,994:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:04:23,995:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfr8pjreCrgljLyw6SkduesaB9FYrPQG_OkgyqXNQLsV_4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:04:23,996:DEBUG:acme.client:Storing nonce: XrsdoYfr8pjreCrgljLyw6SkduesaB9FYrPQG_OkgyqXNQLsV_4 2024-07-12 22:04:23,996:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:04:24,006:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnI4cGpyZUNyZ2xqTHl3NlNrZHVlc2FCOUZZclBRR19Pa2d5cVhOUUxzVl80IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Lx5UwQoN5hnJPkbfRqFFAKdPqCKcF4wyFBvNIKZSDTE6hMfHmDyqW_abrvdRs_rRYXTccvyVhw0YAiGqK_EbHySyJbaJFIinu0gABz6niZDlYdQL_k1Mo7mCJAreqq91-hn0xTB7ExPfUu4AK3qC6Yf5NU6zggTdHlyum3oDX33cI8pWpMX3LRKtrh216YELV2ZoebBZIRVjVjg97evhKtjbY28UGTcxudvdt-8r9s_qHabXKxY9bxOK06plZtI9hn0OAvX4nbvFGAV0_Yj3ot3tSGqORpyNkvlq4x-waGIDfIUfF1xTfWwUT6qwNqR3pK2zQp5QEM37yOJqOvOWUw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-12 22:04:24,200:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-12 22:04:24,202:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:04:20 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042595287 Replay-Nonce: XrsdoYfrs8gH05e0JICsB8GAiqztVPQZgz6hn8wGr8fnBQM1V0o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:05Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183394907" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042595287" } 2024-07-12 22:04:24,202:DEBUG:acme.client:Storing nonce: XrsdoYfrs8gH05e0JICsB8GAiqztVPQZgz6hn8wGr8fnBQM1V0o 2024-07-12 22:04:24,203:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:04:24,215:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183394907: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJzOGdIMDVlMEpJQ3NCOEdBaXF6dFZQUVpnejZobjh3R3I4Zm5CUU0xVjBvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMzOTQ5MDcifQ", "signature": "BzQFkxbwBWgs8nSgIFD36juDA8SsAzDG0_uapeW43aWQxM14Ixsh9U7bHazzZ15VYKRGnwwOUYFaWmozfMlfdZ3UW5r9_AAtENPKcqPN_7ZsPEaMxPgb3BbZlSItDlDIkJIT31kefDEwLobAjoBdYAyFxnlGRXG1F0uJ9fbmasDc-_0pC4DMnt5gB2MQ8alEYWIKzo7mgj9ZQ5hCx2ufs97RwP1aHY2h_FKXBsT5GpEmMOhJg6e-d1rIhI_urRQ8WdvyrCW9NcRHgL7DcmDjZjV17wgoNi5vvnJNlisAqK1ZXS9BlkNWa6sZH0DvgdOJpJ42o9EGhabCoGrAqx83cA", "payload": "" } 2024-07-12 22:04:24,393:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183394907 HTTP/1.1" 200 811 2024-07-12 22:04:24,394:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:20 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdOpUQaJA0SnN4hEQGp2a0ropAqjv0P3TrBiQTE3iOjdY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:05Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/78vQQw", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/p4w28w", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/j5xMwg", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" } ] } 2024-07-12 22:04:24,394:DEBUG:acme.client:Storing nonce: 9v6OBnJdOpUQaJA0SnN4hEQGp2a0ropAqjv0P3TrBiQTE3iOjdY 2024-07-12 22:04:24,395:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:04:24,395:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-12 22:04:24,396:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:04:24,396:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:04:24,397:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:04:24,397:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:04:24,397:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:04:24,398:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:04:24,399:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:04:24,442:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:04:24,666:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:04:24,667:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 22:04:24,668:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 22:04:24,673:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-12 22:04:24,673:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:04:24,673:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:04:24,678:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:04:24,678:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:04:24,679:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:04:24,698:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:04:24,700:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:04:24,705:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:04:25,149:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:04:25,151:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:20 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "ptcLx6omp5E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 22:04:25,152:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:04:30,077:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8396_key-certbot.pem 2024-07-12 22:04:34,760:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8394_csr-certbot.pem 2024-07-12 22:04:34,760:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:04:34,760:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:04:34,908:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:04:34,909:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0HjY_nEN9TY8ytUj2yRu-_Kmpl89WlB5THuN1c2v-a2qOKsfIjE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:04:34,909:DEBUG:acme.client:Storing nonce: 0HjY_nEN9TY8ytUj2yRu-_Kmpl89WlB5THuN1c2v-a2qOKsfIjE 2024-07-12 22:04:34,909:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:04:34,915:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU45VFk4eXRVajJ5UnUtX0ttcGw4OVdsQjVUSHVOMWMydi1hMnFPS3NmSWpFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "g8mU30K8C0O6iMlgqT7Wo0uwGItItgChSNGXUFR9GWnwhrCM89hvgwusFtpizrpUjU7LKZ_jCvdDoEBtB55GQHPGyXGJ89zEpE8NEaX5TFbhbBiFI0vm4mNi0Mq23HLJqTM5OcXejQg6mbtemekZfCVWXTKQkv7bta8eOzlTjYxSYEIDxT7oWk6no8Tqo7excuBi14t34xSLE07AWsDn8NOsp2sVtWPJUDbcHsXKT-9AHxPoHYdKZPEadjSRF83dBj76sxD_LlHq7bpBdMWYUMCe5H4pM3u5WA2mJ83A69XKxNovvcyVDtq4em188XgxkYEJ_ZAzykmwRwRuT9V8xQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-12 22:04:35,098:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-12 22:04:35,098:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:04:30 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042636517 Replay-Nonce: 0HjY_nENM7dvvOVdYyyHkCL8Q4GJk6V7D379d4oPQRsUnoWNJY8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183457817" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042636517" } 2024-07-12 22:04:35,099:DEBUG:acme.client:Storing nonce: 0HjY_nENM7dvvOVdYyyHkCL8Q4GJk6V7D379d4oPQRsUnoWNJY8 2024-07-12 22:04:35,099:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:04:35,105:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183457817: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU5NN2R2dk9WZFl5eUhrQ0w4UTRHSms2VjdEMzc5ZDRvUFFSc1Vub1dOSlk4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM0NTc4MTcifQ", "signature": "fhUtJN7DpXffAGfWu-vJhbygIze6COhPrwTSW6zTfxHyM4AVBdQNNG2tEl3jKUkS9QKvFL3hxmRDXIYwGGYkB9cXb1e8zJpG6ZBI54wUldvTb_U4W-Kr_HgFKBNUmLIhPcWlZ7SAnECKz97ckJ7tMtSayJKH8T8dWtlNAOLTFWYCMfhqQsg7sUHiXhrBM5ITlgfE3Sy521uVTzeNe0c1atBhN0mS6xJCaxO1tasQ5A9j9BFsIWIiVyiRpU0Ojo01gzIHCqYgcxhIzh5b7hHAsrv8iGmfwWBRDPVHsY7UqOO_bgv3vVcKWcJxdgx5Za-OBQheATOrm6gcu1YgN4trQA", "payload": "" } 2024-07-12 22:04:35,261:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183457817 HTTP/1.1" 200 810 2024-07-12 22:04:35,262:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:31 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0HjY_nENAQSMDM418AQO29zssUSh-WpEC5IPIPfOX-F3LbYPBfQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/RejdSQ", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/r4Hc4w", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/l3Nghg", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" } ] } 2024-07-12 22:04:35,263:DEBUG:acme.client:Storing nonce: 0HjY_nENAQSMDM418AQO29zssUSh-WpEC5IPIPfOX-F3LbYPBfQ 2024-07-12 22:04:35,264:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:04:35,264:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-12 22:04:35,265:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:04:35,266:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:04:35,267:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:04:35,267:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:04:35,268:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:04:35,268:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:04:35,269:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:04:35,312:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:04:35,517:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:04:35,520:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-12 22:04:35,521:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-12 22:04:35,526:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-12 22:04:35,527:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:04:35,527:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:04:35,532:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:04:35,532:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:04:35,532:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:04:35,543:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:04:35,544:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:04:35,546:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:04:36,033:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:04:36,034:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:31 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "ux_au_QY2Ww": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-12 22:04:36,036:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:04:40,896:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8397_key-certbot.pem 2024-07-12 22:04:45,543:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8395_csr-certbot.pem 2024-07-12 22:04:45,544:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:04:45,544:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:04:45,707:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:04:45,708:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfrQtc7SA44qF5wfEjKLZpNffo2QEh3zSllq4SviHvo-qk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:04:45,708:DEBUG:acme.client:Storing nonce: XrsdoYfrQtc7SA44qF5wfEjKLZpNffo2QEh3zSllq4SviHvo-qk 2024-07-12 22:04:45,708:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:04:45,714:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJRdGM3U0E0NHFGNXdmRWpLTFpwTmZmbzJRRWgzelNsbHE0U3ZpSHZvLXFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pWXxuTkf8dxZ91MUMi2aOk1kzH9nlpg7xgpqjc12FNYUlktOhvlErUorrDyZQQsuEmPJnKhCJhazGbVwz-Cw5JydeERm4ZU77fKM8IpCcO3hIGdEcsRusOxk5CAi2d9-E31NeV_i0rNNC1YtTLZvhj9ZfKs_3twB_2N-R8nasxIWSpyxJ8ntyyK4qHV5p0Vs-ORcRxJ4bV5CPhPhrDM5EsgnRkLzyfiMzjYWmY71x1YRLohvJLBceJrzq6CrA7S_zlH_BTt75BlKcRhkU8hIjFnCiBamGCrLyJlK6Otkx3lEHKhyzkqQTfsZgxhle_jXpdpcEPuv4hxFKIEVTGfbyA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-12 22:04:45,909:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-12 22:04:45,911:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:04:41 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042672187 Replay-Nonce: XrsdoYfrgIp6Mk0UOiyuvU41jSwBbQrAvaVJiNiGvQ5ffXq9GAo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:27Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183510157" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042672187" } 2024-07-12 22:04:45,911:DEBUG:acme.client:Storing nonce: XrsdoYfrgIp6Mk0UOiyuvU41jSwBbQrAvaVJiNiGvQ5ffXq9GAo 2024-07-12 22:04:45,912:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:04:45,921:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183510157: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJnSXA2TWswVU9peXV2VTQxalN3QmJRckF2YVZKaU5pR3ZRNWZmWHE5R0FvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM1MTAxNTcifQ", "signature": "xi6a8A_4Srz7QQipLDgMOLQdWD8sMKEQETnWtwTprtWgXlHuT0JWrLPP1N-vKjOVnGRz2Q2AnacNS8a1O126KwiAlw5PqV0AJ6_G_sO0pfYTFtpbF46cLedLGiXq-I3cOmby4bgW4np1kdSnFpAfZ5T4YaiTGDtssww40deaQFdjSM4sD457ydU7v0ij-GXY-ccYr-0XwYX_8Xw5eVyhn2E5mGK0re0aHBgzRNAtprB7JUHnh0-02_7cmLXgR2WJ76EF788GU-od6YmAiuqYoJ9WZP8qlL6pJ6wZsXqkWWDyYjsmjvT5QfosD_XxgRebDSnk_st1VFhe2WRwcpciaQ", "payload": "" } 2024-07-12 22:04:46,088:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183510157 HTTP/1.1" 200 809 2024-07-12 22:04:46,089:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:41 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfrPtLRN4dck2vocKK4I_zIpDBIjs-NHb1BaFwLOIaIrq8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:27Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/9E6R1w", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/8v5Buw", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/2WSNJg", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" } ] } 2024-07-12 22:04:46,089:DEBUG:acme.client:Storing nonce: XrsdoYfrPtLRN4dck2vocKK4I_zIpDBIjs-NHb1BaFwLOIaIrq8 2024-07-12 22:04:46,090:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:04:46,090:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-12 22:04:46,091:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:04:46,091:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:04:46,092:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:04:46,092:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:04:46,092:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:04:46,093:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:04:46,094:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:04:46,136:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:04:46,350:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:04:46,353:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-12 22:04:46,354:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-12 22:04:46,358:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-12 22:04:46,358:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:04:46,359:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:04:46,364:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:04:46,364:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:04:46,364:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:04:46,380:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:04:46,381:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:04:46,383:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:04:46,830:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:04:46,832:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:42 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "0la-ranDImA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 22:04:46,833:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:04:52,113:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8398_key-certbot.pem 2024-07-12 22:04:56,740:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8396_csr-certbot.pem 2024-07-12 22:04:56,740:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:04:56,741:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:04:56,891:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:04:56,892:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR2-0g02FmCqagk3LjAq6S-JSZIXdhULBrQolDf2VMaoR4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:04:56,893:DEBUG:acme.client:Storing nonce: _jAl9GR2-0g02FmCqagk3LjAq6S-JSZIXdhULBrQolDf2VMaoR4 2024-07-12 22:04:56,893:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:04:56,903:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiX2pBbDlHUjItMGcwMkZtQ3FhZ2szTGpBcTZTLUpTWklYZGhVTEJyUW9sRGYyVk1hb1I0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OVp6x2Vb0hTXVau43Bv7CHfC9pLlJrke7dH04a8y4zdygNVrUv1PqHE7NCcYxX49f1VDAB6-RIOuOmb3XHqzjIYTKRjn68xIZ2sNQ85JjYFEsAOIite-k57lIw2DCzUZLOmwo5BjqM5t_8zL4zAX3gmfIkSp51WckCeiffqWIDV0FQGGtikVfwnTK-I9N4SwausabJWmsQh5gVMByn31YAwg_rz-0EqSNVPrnV074K_6GfgEs-CDo_TmQBEwVUabxW7UbHudNcn6OfIDjiyUIlCFWR0_goibDcDLYbX7rMAlBjg4YuiF4DgWsYRpQ1zK0njH3ar-dPBdFzHBtWj3Mg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-12 22:04:57,093:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-12 22:04:57,094:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:04:52 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042704307 Replay-Nonce: 0HjY_nENblscr5anRn_kzLjLEPq5RxPBWKK-DZWSR10fJqnBLPs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:37Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183559397" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042704307" } 2024-07-12 22:04:57,094:DEBUG:acme.client:Storing nonce: 0HjY_nENblscr5anRn_kzLjLEPq5RxPBWKK-DZWSR10fJqnBLPs 2024-07-12 22:04:57,094:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:04:57,101:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183559397: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU5ibHNjcjVhblJuX2t6TGpMRVBxNVJ4UEJXS0stRFpXU1IxMGZKcW5CTFBzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM1NTkzOTcifQ", "signature": "VPm5Egy2h1tLMYlHflnjcmdhrkarmVcQOlcD6zyFWagLsofGutr4MoFtrmSrHMqUItpPlfmQhdFPfFOJWi6p3JNszBe7Z9UJ-qvM9OL4BRKoDjAMBso7VRlERXQrGxc411WP9qBbrW05y3w8mPv-m9L_I6HJoAKM0Kvkp29I47QsY0b9iQrC8FKvP9qpxhXDPMWFBNH7YjnOxvvijn4dt8ptsx7bMct6AUBrMuqa73KSQNx7i4sh7jpGe-Rha0J4LQA1E2Hzu1PYicDwOVIbDuPZ9US3UxsUxFn-tuMZNJ26kKW4XxbOklBJaMTBDheK7eoKOv7_GxAL5xa20QxSoA", "payload": "" } 2024-07-12 22:04:57,257:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183559397 HTTP/1.1" 200 805 2024-07-12 22:04:57,258:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:53 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR2XM7JwIIadjjcvhY6z_m5UPMMhClXEffG7qHiowe2P6Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:37Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/8Y1D2A", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/nFVVvA", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/ITyESg", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" } ] } 2024-07-12 22:04:57,258:DEBUG:acme.client:Storing nonce: _jAl9GR2XM7JwIIadjjcvhY6z_m5UPMMhClXEffG7qHiowe2P6Q 2024-07-12 22:04:57,259:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:04:57,259:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-12 22:04:57,259:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:04:57,260:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:04:57,260:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:04:57,261:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:04:57,261:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:04:57,261:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:04:57,262:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:04:57,315:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:04:57,572:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:04:57,574:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 22:04:57,575:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 22:04:57,580:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-12 22:04:57,580:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:04:57,580:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:04:57,585:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:04:57,585:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:04:57,585:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:04:57,603:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:04:57,604:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:04:57,606:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:04:58,091:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:04:58,092:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:04:53 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WPjUuDWAN9o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 22:04:58,093:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:05:02,966:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8399_key-certbot.pem 2024-07-12 22:05:07,655:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8397_csr-certbot.pem 2024-07-12 22:05:07,655:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:05:07,655:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:05:07,828:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:05:07,829:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:05:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdBAv5bm7Wfnp5dVceF3po6lqaKOB741qmoOtTViYWA8M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:05:07,830:DEBUG:acme.client:Storing nonce: 9v6OBnJdBAv5bm7Wfnp5dVceF3po6lqaKOB741qmoOtTViYWA8M 2024-07-12 22:05:07,830:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:05:07,838:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOXY2T0JuSmRCQXY1Ym03V2ZucDVkVmNlRjNwbzZscWFLT0I3NDFxbW9PdFRWaVlXQThNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "N2lqUcr8QDDoODfv27GJlsNzmwRQJItHNoD5kvHn2LnJ-t7eag1Wkg1ohkrKXjDNWeY0LQGYUqGd9iP7_w4K7BqApbbeQV7rKOiy4XezXzcKA9QVv9d8at49dKCDHSsHcN6kF-Hd1---vA1Z1VYNDjHmWM9jEyMGuvApC5R8V7oau4IqIczAd1qaJvLCzXrxTenK7ZqalTVpOsW3Qyn3MbJoNyTsN3UwBU4PadEbyHwghI6K1fsBHSEo0RAay6h3dEMn2Pw2jXuuSg25CS8SQZwheDWkc538mzhiTHz_zBu3WQg9Zh6xHCfL7Vlfj9csDxJ1CALyzLRyI0uxvdhaFw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-12 22:05:08,053:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-12 22:05:08,054:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:05:03 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042741137 Replay-Nonce: XrsdoYfrMpA3quYXIuHLKhWZ1lMuHrUDKTfq305qBCpdGs0dLoE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:49Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183613287" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042741137" } 2024-07-12 22:05:08,054:DEBUG:acme.client:Storing nonce: XrsdoYfrMpA3quYXIuHLKhWZ1lMuHrUDKTfq305qBCpdGs0dLoE 2024-07-12 22:05:08,055:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:05:08,063:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183613287: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJNcEEzcXVZWEl1SExLaFdaMWxNdUhyVURLVGZxMzA1cUJDcGRHczBkTG9FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM2MTMyODcifQ", "signature": "eydJ2w2pwS47b0uHV4dm6pB22K3P-6KTgwVqV_1RFERx451n_tjh1xAX8mRbLVh80ehJDFGXrFRNp2ZKXOYHZEzwxMhweoP01gXHmQLBUYGfKjD6gmtMemYzy8y1vCgT-b2u02_uAO7m6XqYK1htowsLpui6_iPkP-ngd8kBOe70MiIkF7de2kutCQCoENBnzpRy6m5UA2AafKmJh_rH1c9yDmGt11KhyiQTllMEEqCyGkG6mrFFRSPCpFhMzcVmOQRfzgrY1ybddsa7TAzQRd7V8GOLuFUWnc74vuwdbYq6I3FVWRwLzSsQzV3ox_QqYJ6sabpNVShkdfcpVYTnIw", "payload": "" } 2024-07-12 22:05:08,244:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183613287 HTTP/1.1" 200 805 2024-07-12 22:05:08,246:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:05:04 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfrccH_4rSBWBIILVrxh1pt5zSK3pkuR-OzbkKdCdw9TwM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:49Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/Dj3vNw", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/EcZFOg", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/OjEpqw", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" } ] } 2024-07-12 22:05:08,246:DEBUG:acme.client:Storing nonce: XrsdoYfrccH_4rSBWBIILVrxh1pt5zSK3pkuR-OzbkKdCdw9TwM 2024-07-12 22:05:08,248:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:05:08,248:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-12 22:05:08,249:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:05:08,250:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:05:08,251:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:05:08,252:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:05:08,252:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:05:08,253:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:05:08,254:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:05:08,307:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 22:05:08,587:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 22:05:08,590:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-12 22:05:08,592:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-12 22:05:08,599:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-12 22:05:08,599:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 22:05:08,600:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 22:05:08,605:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 22:05:08,605:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 22:05:08,605:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 22:05:08,621:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 22:05:08,622:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 22:05:08,625:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 22:05:09,139:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 22:05:09,140:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:05:04 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CX305VbN6cw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 22:05:09,140:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 22:05:14,342:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8400_key-certbot.pem 2024-07-12 22:05:19,082:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8398_csr-certbot.pem 2024-07-12 22:05:19,082:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 22:05:19,083:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 22:05:19,244:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 22:05:19,245:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:05:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdvpYU9S_bAGJYBpQEMtY-krrwzVjo1-ix1gyLEweO06M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 22:05:19,245:DEBUG:acme.client:Storing nonce: 9v6OBnJdvpYU9S_bAGJYBpQEMtY-krrwzVjo1-ix1gyLEweO06M 2024-07-12 22:05:19,245:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 22:05:19,251:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOXY2T0JuSmR2cFlVOVNfYkFHSllCcFFFTXRZLWtycnd6VmpvMS1peDFneUxFd2VPMDZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KZPCpzsS4SOJgYpXhFXjTQbUk-Ik7HyKEgFkAWoVTd8cfjXapycI0Ez6DiqKLmXBsnvWQhUZj6NoDPrJDChqI4UkMSXUu7eLqG6GO3e9FHWpIAlkYOCnZJwoh5wo0S8nE9L6lfnhEnpMLg6r7pkYslDEwXFjbr4hI1dv_nb991pG4Ynff2xchUSeYxjeGY2yQkHlnD-HS5b3V04qCNviGhEFuQ8DF5nLr0aiii28yXiSQzO6BxOisrdwZSU0f6lBL4cYKKzR8WTVgIrhtKs2Zi5Wck-POqi_Z_IUyoORFHZmjqKCpsErTbXmyLOvWWpAcCEzLPoAJw6J087GRvUGKw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-12 22:05:19,937:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-12 22:05:19,939:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 20:05:15 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042772467 Replay-Nonce: XrsdoYfrSjv0cWKDQOhl28kpwwGx6N8EZCzIPlvxsldjMS6zhj0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:59Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183661077" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042772467" } 2024-07-12 22:05:19,939:DEBUG:acme.client:Storing nonce: XrsdoYfrSjv0cWKDQOhl28kpwwGx6N8EZCzIPlvxsldjMS6zhj0 2024-07-12 22:05:19,939:DEBUG:acme.client:JWS payload: b'' 2024-07-12 22:05:19,945:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183661077: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJTanYwY1dLRFFPaGwyOGtwd3dHeDZOOEVaQ3pJUGx2eHNsZGpNUzZ6aGowIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM2NjEwNzcifQ", "signature": "OIcZ8yJzSUTcN2FpI2dUF9CYhiHCZhFS1_oFrFfOKROJp-aXAYd5S_BAOpe95n54htatAWXEeJvUnibuQvxSzxIVb7stbEE_KMPvVNehyIflIL0_pXvX5e-mhCExFcWCivpEZ55G7cOZ3b07CW9DutVpTJRtCmZrmsZl_-TysHogBP8NCbidBHxaTobe7IOrwrW-hTykVdcUEL5HFuPxvXufVQVqNE3PAZcZ5FyFGX2tMnsby5o_yl6xtHotXMTQaDCsj5cpMkvgiz-4tR1o62rXeHS3JWKPxSCVFYa6B1218irzbbEmuKdoZSteB3YrmrIbKPwhJ8y6A7wXvIfJyw", "payload": "" } 2024-07-12 22:05:20,113:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183661077 HTTP/1.1" 200 805 2024-07-12 22:05:20,115:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 20:05:15 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdhGNVpX-5kohpFouYh_-FqFAWIZtnGkIFiKz_281sHq0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/mMPmZA", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/oiTplA", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/6s0vLQ", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" } ] } 2024-07-12 22:05:20,115:DEBUG:acme.client:Storing nonce: 9v6OBnJdhGNVpX-5kohpFouYh_-FqFAWIZtnGkIFiKz_281sHq0 2024-07-12 22:05:20,116:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 22:05:20,117:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-12 22:05:20,118:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 22:05:20,118:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 22:05:20,119:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:05:20,119:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 22:05:20,119:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 22:05:20,120:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 22:05:20,121:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 22:05:20,121:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-12 22:05:20,121:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-12 22:05:20,133:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-07-12 22:05:20,135:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)