2024-07-12 05:57:00,411:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-12 05:57:00,412:DEBUG:certbot._internal.main:Arguments: [] 2024-07-12 05:57:00,412:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-12 05:57:01,173:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-12 05:57:01,173:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-12 05:57:01,211:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-07-12 05:57:01,255:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:57:01,470:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:57:01,474:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-12 05:57:01,483:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-12 05:57:01,493:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-12 05:57:01,494:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:57:01,494:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:57:01,499:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:57:01,499:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:57:01,499:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:57:01,505:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:57:01,507:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:57:01,509:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:57:02,019:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:57:02,020:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:56:58 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Ihp9UDv7qRA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 05:57:02,021:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:57:07,067:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8373_key-certbot.pem 2024-07-12 05:57:11,568:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8371_csr-certbot.pem 2024-07-12 05:57:11,568:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:57:11,569:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:57:11,731:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:57:11,732:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdUu7JK55Zr-ioTrP77WspIfjPxlVeGrKMJTpcU2sQWac X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:57:11,732:DEBUG:acme.client:Storing nonce: 9v6OBnJdUu7JK55Zr-ioTrP77WspIfjPxlVeGrKMJTpcU2sQWac 2024-07-12 05:57:11,733:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:57:11,739:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOXY2T0JuSmRVdTdKSzU1WnItaW9UclA3N1dzcElmalB4bFZlR3JLTUpUcGNVMnNRV2FjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EJPScNnFdfGlBg0Qm-aGsbN5jZHENoYr04uj0DHDMygdoQhQpsRVo4SHGkCYSxT84oHymP-3ZlIpVfU08PAharEfhJkwnYV_yg5JYdHea0F_U0PAY6UgdVUvmxNm1Ml2dCPHvTZZ27k_9OPWEQMSPvHtlaqz0NdIKejeHNK00gJxzaDFBieNc2YGmIdQ9i8h0aYaJjw1eNO9JjmoXAzzu18mOiYaXrfoS-fHeP4znKEFeeC_1m2_K7Mvwq6wOM-XuD8UZUYW5SXR3IMY2xZVBjUJQAkyR45WtgGwUMOCiZqO246WxVsUP9vCrf8AKyLycHIvAwBqtYevHzaaoUJ2TQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-12 05:57:11,925:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-12 05:57:11,927:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:57:08 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042282867 Replay-Nonce: 9v6OBnJdAPxhmwqVfYp7F6EEZKBXDGTnNLILmwHgdCZ1hZVvegE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:36Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182938057" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042282867" } 2024-07-12 05:57:11,927:DEBUG:acme.client:Storing nonce: 9v6OBnJdAPxhmwqVfYp7F6EEZKBXDGTnNLILmwHgdCZ1hZVvegE 2024-07-12 05:57:11,928:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:57:11,933:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182938057: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOXY2T0JuSmRBUHhobXdxVmZZcDdGNkVFWktCWERHVG5OTElMbXdIZ2RDWjFoWlZ2ZWdFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODI5MzgwNTcifQ", "signature": "gm-YnFs7sbJ-SZHDuS9XZnygRvnRmr1g04UQc0AA1ngJ1wt0Ce-qjrPv60NW0YUpaK3OeaEjN08hDcnJqfrgOEySct13ORHG2ZDfK8XHqKPRoghST9HgRKn4pvRM05SNtjtLiIYzhN2F17cOAM67V0Q_xqP0SWB_SaH2axoDCyNGuJrI2tY2TICWml0sLzWHt9HvyL6G5WnC4FkJHc0b-Lk2Ef74WjCbmMcVWVc3elcWjskvzT1020ckWEUaaCoLiTVea1OxaR4uLNBGjUrZsVyIIidzPFjB9DKoRHiFqIoE3sVKCfPi4OC9dQVIf_J-qDewafVdM_l5M_kGhlqYkw", "payload": "" } 2024-07-12 05:57:12,113:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375182938057 HTTP/1.1" 200 810 2024-07-12 05:57:12,114:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:08 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdJJnMdPZDIxyRWiLom68YoAfSrA2Qzl9vdhZqWWLgj9E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:36Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/gtbErw", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/uhlVRg", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/KhzwYg", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" } ] } 2024-07-12 05:57:12,114:DEBUG:acme.client:Storing nonce: 9v6OBnJdJJnMdPZDIxyRWiLom68YoAfSrA2Qzl9vdhZqWWLgj9E 2024-07-12 05:57:12,115:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:57:12,115:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-12 05:57:12,116:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:57:12,117:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:57:12,122:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:57:12,122:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:57:12,122:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:57:12,123:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:57:12,128:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:57:12,169:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:57:12,372:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:57:12,374:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 05:57:12,374:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 05:57:12,379:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-12 05:57:12,379:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:57:12,380:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:57:12,385:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:57:12,385:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:57:12,385:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:57:12,390:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:57:12,391:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:57:12,393:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:57:12,842:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:57:12,843:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:09 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7U7U8EiSfmE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 05:57:12,844:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:57:17,891:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8374_key-certbot.pem 2024-07-12 05:57:22,487:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8372_csr-certbot.pem 2024-07-12 05:57:22,487:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:57:22,487:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:57:22,640:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:57:22,641:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0HjY_nENYPFT1HGNPhQcwK-dKSbnfJ75inat5Sy7sTnu7EHL_Aw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:57:22,641:DEBUG:acme.client:Storing nonce: 0HjY_nENYPFT1HGNPhQcwK-dKSbnfJ75inat5Sy7sTnu7EHL_Aw 2024-07-12 05:57:22,642:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:57:22,647:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU5ZUEZUMUhHTlBoUWN3Sy1kS1NibmZKNzVpbmF0NVN5N3NUbnU3RUhMX0F3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XmSUR0kW_qy7qDmTz8Jq7wvbCp8BVHwKekRup4ErWS428CvFloeqVrTzO8TAWRzSjTFp8Ft6iQdGYsYZMH58IEMNPQhOx9flVcfVLkxLHqET-wbHp-3fTGA-Xke7-o76XNxLSXl4pPGujbkaXX-b2kviX5CsQ6eWBgyfPVcuIrVmORJZZx572Qt83Kg2gTXpW_P32QxFfWgc8CTTit0uinj3kVWh_2O79dIpJf9w07snsMAS2LpxzcZr7b1G1rX9lvBu8JMybbFLB5Fhnc8RCCsR1tcLb7g3-SM-dMvjpqGHhMT8qGMbVrvlORBIubvbWESpmYneTdbLwqsEJm6RoA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-12 05:57:22,825:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-12 05:57:22,827:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:57:19 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042319787 Replay-Nonce: _jAl9GR2F54DghyDAjNiAFaYOZ0EYpGTS9fVKnMahp6hGqNYwrk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:48Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182994777" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042319787" } 2024-07-12 05:57:22,827:DEBUG:acme.client:Storing nonce: _jAl9GR2F54DghyDAjNiAFaYOZ0EYpGTS9fVKnMahp6hGqNYwrk 2024-07-12 05:57:22,828:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:57:22,837:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182994777: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiX2pBbDlHUjJGNTREZ2h5REFqTmlBRmFZT1owRVlwR1RTOWZWS25NYWhwNmhHcU5Zd3JrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODI5OTQ3NzcifQ", "signature": "KWEqKHHkQ49HsFMlNLmQEZrVTRMBIzaQtMqGIWusZUSYEQMSuSZb-_npd0ARTnSs2noZDSmDAsDuYJ2bTL3HeauWkU-cdkP2CCAnovSxs9S5w8f8OmL01gIP-Vyt_5S5K7StaN1zEoCCBHlQ8p53FBtvEqh1Qc5kUfTBBc0Urg760qB6adourECaLsugyXQ026ucB2WVWhKcc1Ovz6wtd2bvwCzNizG0N_L2dRkuliuL5SgIpn0HsBe07j3QnG8fv2jT3l-ZIOfP7AUU1DjhRwG9YlktlCuJD_Mh5-Ei2ubSiNQAPSSpzsSK7ZZohRVtpdt4vMjGRsFLc_zi8ydwJw", "payload": "" } 2024-07-12 05:57:23,005:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375182994777 HTTP/1.1" 200 804 2024-07-12 05:57:23,006:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:19 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR2SBGld8wNbiQXSLUO5WH5DVwpByDQJ92Ulu3wZAbz6DA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:48Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/Qwv2DQ", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/7TjcFQ", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/hJdTTw", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" } ] } 2024-07-12 05:57:23,007:DEBUG:acme.client:Storing nonce: _jAl9GR2SBGld8wNbiQXSLUO5WH5DVwpByDQJ92Ulu3wZAbz6DA 2024-07-12 05:57:23,008:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:57:23,008:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-12 05:57:23,009:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:57:23,009:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:57:23,011:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:57:23,011:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:57:23,011:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:57:23,012:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:57:23,013:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:57:23,053:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:57:23,268:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:57:23,271:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-12 05:57:23,273:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-12 05:57:23,282:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-12 05:57:23,282:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:57:23,283:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:57:23,288:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:57:23,288:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:57:23,288:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:57:23,297:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:57:23,298:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:57:23,300:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:57:23,779:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:57:23,780:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:20 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jX3072lYKZ4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 05:57:23,781:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:57:28,680:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8375_key-certbot.pem 2024-07-12 05:57:33,158:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8373_csr-certbot.pem 2024-07-12 05:57:33,159:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:57:33,159:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:57:33,320:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:57:33,322:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfrvGAJXjiN2LG0f5wCJZ676xipVR89y_311Qd4spLsJjI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:57:33,322:DEBUG:acme.client:Storing nonce: XrsdoYfrvGAJXjiN2LG0f5wCJZ676xipVR89y_311Qd4spLsJjI 2024-07-12 05:57:33,323:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:57:33,335:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJ2R0FKWGppTjJMRzBmNXdDSlo2NzZ4aXBWUjg5eV8zMTFRZDRzcExzSmpJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nG_AMJ7Lxp9G0EwPYrhj0oI44ilFV3yOnZbKLOeOwKqZCmy7-R0GkLmhmZ8mlxQ5J1CDUpzVv5aFoFXcNzEO-VJX4hUn2GLHKK9TS1cPuCEr_yNpJNDgczlpjBxo94880ob3YtDYVFi9UdaLPWcPIySjGtzkg4L1VR8ekh_VombIRrHY6un3cd6CCQtpI4sfqS8nH_dgm3AtXB3haaNRGGozLvzW-4wyp-v9_0VHVbCYT0-kIQ_Y36rp09sQLj6UDEMH5y22IKYRK2biLOotkPWIDakj8qrcpbHhdeFSSkHADwPPTJBSncoKBCDnzdMzBKTW1pCYZ7erYArZjxuoIQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-12 05:57:33,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-12 05:57:33,522:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:57:29 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042354327 Replay-Nonce: XrsdoYfrOfdMCQvVT-lrkr6LKjvXHcKm7wfkukWUYE7KpAruDWY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:59Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183044847" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042354327" } 2024-07-12 05:57:33,522:DEBUG:acme.client:Storing nonce: XrsdoYfrOfdMCQvVT-lrkr6LKjvXHcKm7wfkukWUYE7KpAruDWY 2024-07-12 05:57:33,523:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:57:33,531:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183044847: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJPZmRNQ1F2VlQtbHJrcjZMS2p2WEhjS203d2ZrdWtXVVlFN0twQXJ1RFdZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMwNDQ4NDcifQ", "signature": "T4lFEht5EUhR9AvY4C-PSIAfmL3BaHn9cl4OUp3ABAwTRKOhvdargl4bQkAATxZiPQKJB2oaVFD184Qxr7Z6RYziBJTd4OQH9UuAv7um4CwKVhn-eCHXqmyxy5HPu3vefYG5xMmBUzr8_px_C_L45y21ddyCODSUfuqml7FQ5XJ3_9KdWxZmWKb9ItrT54cs9KP7Tg_TTvXBLODWQ0piih_5LLhznhTxFoyurCAp_7iJTQ8oUGupqQ5w4e8qek3B-zHVYrkc2I3h4Jp0UQNf2Y0IYSAuVi5qmr-8wwE_mPhYvZuj8du7Vxvq_EVH0BXwIVKXKDpy2NEA6krDvtC8fQ", "payload": "" } 2024-07-12 05:57:33,696:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183044847 HTTP/1.1" 200 807 2024-07-12 05:57:33,696:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:30 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdqcn4OQG7DdMcjbIKpWj5mLA6I8SPtRA8GvlTsPWTHNA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/MqkCfA", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/OGQ48g", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/eU6s8Q", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" } ] } 2024-07-12 05:57:33,696:DEBUG:acme.client:Storing nonce: 9v6OBnJdqcn4OQG7DdMcjbIKpWj5mLA6I8SPtRA8GvlTsPWTHNA 2024-07-12 05:57:33,697:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:57:33,697:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-12 05:57:33,698:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:57:33,698:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:57:33,699:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:57:33,699:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:57:33,699:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:57:33,699:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:57:33,700:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:57:33,750:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:57:34,014:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:57:34,016:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 05:57:34,018:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 05:57:34,025:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-12 05:57:34,025:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:57:34,025:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:57:34,030:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:57:34,030:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:57:34,030:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:57:34,035:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:57:34,035:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:57:34,037:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:57:34,487:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:57:34,488:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:30 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "DYFrVr7H5GE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 05:57:34,489:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:57:39,187:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8376_key-certbot.pem 2024-07-12 05:57:43,644:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8374_csr-certbot.pem 2024-07-12 05:57:43,645:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:57:43,645:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:57:43,798:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:57:43,799:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0HjY_nENah4Jtq5knCQSAsTpziGaEDZY2pNfQYX7PltQ0cLBwL4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:57:43,800:DEBUG:acme.client:Storing nonce: 0HjY_nENah4Jtq5knCQSAsTpziGaEDZY2pNfQYX7PltQ0cLBwL4 2024-07-12 05:57:43,800:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:57:43,808:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU5haDRKdHE1a25DUVNBc1RwemlHYUVEWlkycE5mUVlYN1BsdFEwY0xCd0w0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YC3r8_9WYekYiaqesBianBMfzinvcec4DiuDVWeNz2U1Tte331MwB9iihgsQvhPU49ArpZg3UZmFtoNDPM1Jm9gWTemtyrPQX9CCxXrMJ6t3HE38Qwe16NrlPpGIQAPHzV1RBM7rK5-ufR4vSNf2YHaS59ndbS4JL4NvoRZjw7QGb5YVEPz1Lj974yoGLKOPjBvGBcl_nEKqNKMEAxS5LlYHGHGpprl20a6pI8Bkg_b2QF38cPmte4Gy40S74KkfBnj09icpXSwAbZzCuLthhD9ztDgdefQNsgwSJ_ulJfFAM9GLdGNdfwOHlrcyKUbyxxIhw6-TV0S87msY-146EQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-12 05:57:44,049:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-12 05:57:44,050:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:57:40 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042400737 Replay-Nonce: 0HjY_nENMrCPc2FQBQqI9ZBLx_aq9UhK3ncl9VraMpSSTMLD_Gk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:10Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183108237" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042400737" } 2024-07-12 05:57:44,051:DEBUG:acme.client:Storing nonce: 0HjY_nENMrCPc2FQBQqI9ZBLx_aq9UhK3ncl9VraMpSSTMLD_Gk 2024-07-12 05:57:44,051:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:57:44,061:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183108237: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU5NckNQYzJGUUJRcUk5WkJMeF9hcTlVaEszbmNsOVZyYU1wU1NUTUxEX0drIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMxMDgyMzcifQ", "signature": "RwHDKeh8WF-YNrZvhOiR0U_3jDFt9zNXWS1yERZgCXq8JMlFLWndMnGvnwNLmQCJANKHZ6qO3PzYu1r3G3rn-W4UyrVogL8q8xOYAMYnX-4kdVVkqCrJW7XZwepIYSOcRHBWqbtOX9I67YBSr9IHldCFv6na3rMnzLd634gzBJ9_9l3lcV9mR2Zxv-tRYl7poJg_7r_2a21CdGUlxfX0CQS8sa0Pk7gHjJj1qHzR6yDqSCOj_Xw7s6ScTLkm4F4mQ36eknX6GQmbOXlSw2oByLk4dOZw-gRGT7OnxSB4GBFwNiUst3kO6-3Vnf06u4i-PA15NGeDt_P7m4V3SEibYQ", "payload": "" } 2024-07-12 05:57:44,216:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183108237 HTTP/1.1" 200 801 2024-07-12 05:57:44,217:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:40 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0HjY_nENh63xR71kAaXaedMkhlzWrm9eZAeDcrh828i55XoPE4o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:10Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/2jPgJg", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/MtdTdg", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/1H2g1Q", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" } ] } 2024-07-12 05:57:44,217:DEBUG:acme.client:Storing nonce: 0HjY_nENh63xR71kAaXaedMkhlzWrm9eZAeDcrh828i55XoPE4o 2024-07-12 05:57:44,218:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:57:44,218:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-12 05:57:44,219:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:57:44,219:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:57:44,220:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:57:44,220:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:57:44,220:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:57:44,221:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:57:44,222:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:57:44,272:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:57:44,483:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:57:44,485:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 05:57:44,486:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 05:57:44,491:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-12 05:57:44,491:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:57:44,492:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:57:44,497:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:57:44,497:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:57:44,497:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:57:44,513:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:57:44,514:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:57:44,516:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:57:45,003:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:57:45,004:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "vKEKGA_svCw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-12 05:57:45,005:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:57:49,787:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8377_key-certbot.pem 2024-07-12 05:57:54,305:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8375_csr-certbot.pem 2024-07-12 05:57:54,306:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:57:54,306:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:57:54,468:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:57:54,469:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJd79wAnA0RJ-m0qCL3HxQ92CwB0vXroeoyWTB_CEb8Uc4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:57:54,469:DEBUG:acme.client:Storing nonce: 9v6OBnJd79wAnA0RJ-m0qCL3HxQ92CwB0vXroeoyWTB_CEb8Uc4 2024-07-12 05:57:54,470:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:57:54,483:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOXY2T0JuSmQ3OXdBbkEwUkotbTBxQ0wzSHhROTJDd0Iwdlhyb2VveVdUQl9DRWI4VWM0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "S7l61aqjpgW1mlibn_qX_BXfw5IPRlQG4BMXwMHxap5B2ZhNHtXkuCSjnlbMLYYZhBd1bH_wZHM7hMDqlFHsRnJJjALhXCXgmKmGlwOSOaibJd6pJ9PwAjJXB1nr4I0JrnAVYK3CG-s_YZiBppDzS89xeuuQO9RAHeo9RtG7ouWHxTQ4TxXcqOdZWFAbhIoN5DcLC0LjOuLshrs6D5vi-ttaLyJBoINJVIWvHxaIq_JHtFoqCpkfloHHqZRFk3oKVHFl5msDCbSS0Cf5HwA4AIHAr1NbskpsbTtPKY6p6VHWgoktbfxtvKff9T6KskgXlwiVFRSxIBfztLQaejdBcQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-12 05:57:54,682:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-12 05:57:54,683:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:57:51 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042441707 Replay-Nonce: 9v6OBnJdetpuLu1FFOF5OrkPUt9P6FS_9BYkimVW22bvMisGb_c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:21Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183170507" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042441707" } 2024-07-12 05:57:54,683:DEBUG:acme.client:Storing nonce: 9v6OBnJdetpuLu1FFOF5OrkPUt9P6FS_9BYkimVW22bvMisGb_c 2024-07-12 05:57:54,683:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:57:54,689:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183170507: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOXY2T0JuSmRldHB1THUxRkZPRjVPcmtQVXQ5UDZGU185QllraW1WVzIyYnZNaXNHYl9jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMxNzA1MDcifQ", "signature": "fiu2YQeX6wfuKCJa8NR3qOjqvNVZ2AZ4Whc0D-HZNNp3l8ikWqAsjLiUVdqpweObTKvo_qDvJhwsbX3oOZnPQEGTS6118nxGICDKfx3GKBoRxfOIYPoGe0f5oJm91ERaZCBJqd1N1HeM_noFkcVHn1PQd6CjtCm6I7fhQJh7ZBh1Cmv2SK4CQU1mVXjH7-rFegKf__Fc9XcVrDHaPn--c6nw-xDoeIfjP8KFbxxM2Or_MYK5wBmkVv6nIhQ6gXZk8FOUZ30zj4FtTc-4OsOSCl0hSs_ZfwFnOme6pFgv3MDKvk2Yvol8kd3UuSLTMyzy8vbO3Ozmtdcf9ZKvisFAFg", "payload": "" } 2024-07-12 05:57:54,857:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183170507 HTTP/1.1" 200 805 2024-07-12 05:57:54,859:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:51 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdQLykiJGVKyQxp_2f7QvHzkC3gpmdrhq69CVAWbbN3O4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/LCB2Ww", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/I9mxAw", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/UAlFYQ", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" } ] } 2024-07-12 05:57:54,859:DEBUG:acme.client:Storing nonce: 9v6OBnJdQLykiJGVKyQxp_2f7QvHzkC3gpmdrhq69CVAWbbN3O4 2024-07-12 05:57:54,860:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:57:54,861:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-12 05:57:54,862:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:57:54,862:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:57:54,864:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:57:54,864:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:57:54,865:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:57:54,866:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:57:54,868:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:57:54,921:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:57:55,129:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:57:55,132:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-12 05:57:55,134:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-12 05:57:55,143:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-12 05:57:55,143:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:57:55,143:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:57:55,156:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:57:55,156:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:57:55,157:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:57:55,161:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:57:55,162:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:57:55,164:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:57:55,649:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:57:55,650:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:57:52 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "th2eL45FNsA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-12 05:57:55,651:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:58:00,222:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8378_key-certbot.pem 2024-07-12 05:58:04,747:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8376_csr-certbot.pem 2024-07-12 05:58:04,748:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:58:04,748:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:58:04,909:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:58:04,911:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfrJASH1VGVLFtgQt0RQ94H76Thax2QZICfNAw6SpbxSDI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:58:04,911:DEBUG:acme.client:Storing nonce: XrsdoYfrJASH1VGVLFtgQt0RQ94H76Thax2QZICfNAw6SpbxSDI 2024-07-12 05:58:04,912:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:58:04,923:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJKQVNIMVZHVkxGdGdRdDBSUTk0SDc2VGhheDJRWklDZk5BdzZTcGJ4U0RJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YMNS7sczSL9Ln_10b1NufAagoW5L7tARA-MHmgN0q4KRGVmp05-hVBQ1gJwjTo5MuaMvmN2FTx44xv7sVlDhBrv_2NH4oiCM6NiS99lfORK1474UESSimTrixdolYAFGjZ7HazaCMdlWU_sielNBTklhT-fyk4jmuwdOxsqTewyGzSMklp_SQaQfKoVBQVla_HEuF1BSy6xs5TWp2Zd03PhM3hWHXEAl_JXVx9xriOdGQXCtgnZ1GBUVCYhqwHPuhYiYfs4RUJiK21FYqBX3bN_W86d1dvecV0N3zAEs9u8omOb3gEh_Rv2KCkvBzzuYFYGb1LeC0tjTQB8ZkHEgVQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-12 05:58:05,108:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-12 05:58:05,109:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:58:01 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042480887 Replay-Nonce: XrsdoYfrM-m--YwoSMR4nxAjmC43VxHNB8ZQOTDTS6qwP4gZyoY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:32Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183227457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042480887" } 2024-07-12 05:58:05,110:DEBUG:acme.client:Storing nonce: XrsdoYfrM-m--YwoSMR4nxAjmC43VxHNB8ZQOTDTS6qwP4gZyoY 2024-07-12 05:58:05,110:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:58:05,121:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183227457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJNLW0tLVl3b1NNUjRueEFqbUM0M1Z4SE5COFpRT1REVFM2cXdQNGdaeW9ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMyMjc0NTcifQ", "signature": "T3xbyku-5jo5HDcxASajWK3WCJX9f3gcF-tC-5eCtHdAzuByouYDPArZnvrmpxQpa2qWyBc-_LbTdiCXZC7LReInxj1qbYn44H0S-e8y2V_nNDwkLXzxHnnC0pmzV7RM-3u7QYhBiGE0x9HoQi59y3fYwNn3t3oYrwP-qKdma3vM2m2UZTuM3zqAIrMHYyLZYdZHzqvf6aUwPM-WFv7X9R3lcJZM3b0kEAOI0RG7xI0ajA-eWVwoZrnYhR6u77ewix0WzURTMhDmnAo-Qx4_ehoaKP8fWZkdcxI3mr5LmHrobQ8ffteI1A6uTQcZB2LhgM7Zod9GwuE_Fygl2NEWpg", "payload": "" } 2024-07-12 05:58:05,288:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183227457 HTTP/1.1" 200 809 2024-07-12 05:58:05,289:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:01 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdOvb_m890nKxCntHqYQ-ObJQIOzwMCB9_fthpFWd1tKU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/Us5Z1g", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/XssHxw", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/UVYPXQ", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" } ] } 2024-07-12 05:58:05,290:DEBUG:acme.client:Storing nonce: 9v6OBnJdOvb_m890nKxCntHqYQ-ObJQIOzwMCB9_fthpFWd1tKU 2024-07-12 05:58:05,291:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:58:05,292:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-12 05:58:05,293:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:58:05,293:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:58:05,295:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:58:05,295:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:58:05,296:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:58:05,296:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:58:05,298:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:58:05,334:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:58:05,569:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:58:05,570:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-12 05:58:05,571:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-12 05:58:05,575:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-08-06 23:03:56 UTC. 2024-07-12 05:58:05,575:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:58:05,575:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:58:05,580:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:58:05,580:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:58:05,580:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:58:05,596:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:58:05,597:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:58:05,599:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:58:06,068:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:58:06,069:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:02 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "fYYPrrxw3QI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 05:58:06,071:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:58:10,566:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8379_key-certbot.pem 2024-07-12 05:58:15,031:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8377_csr-certbot.pem 2024-07-12 05:58:15,032:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:58:15,032:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:58:15,190:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:58:15,192:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfrPSGBTBC7LrnXj3yeFFc89YoH02sC481o15KpsG2lsJs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:58:15,192:DEBUG:acme.client:Storing nonce: XrsdoYfrPSGBTBC7LrnXj3yeFFc89YoH02sC481o15KpsG2lsJs 2024-07-12 05:58:15,193:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:58:15,202:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJQU0dCVEJDN0xyblhqM3llRkZjODlZb0gwMnNDNDgxbzE1S3BzRzJsc0pzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MkcB9BSUDKgc879Gne__elXCdgRTxKA_gCKv4QBqGIBJPuMIrgrW6HFVYxQdvuR1qwDo4k2LU7S6obe7rBW_wQq9KMNtQoR-BVhyM5WZsr2l9Pbzzi4Suax0Jg0vuooMWLtg85gvKVhx-J1BOy-yOcbYAgOPYGiSXnkX0tLXAasmp9pdlXWKUrtBcpKKA7n1WtPpgAE-BPJK-bidCk9-InKUSRPyfk5-ONBDGIPF7x6Qksf6yp6Jo0ReiXG0gQsJKDiAkqHX1LjHY-XdvpAiHTYlyiEvZ6VtavD3Z8D8Rv7vcqa2TMTD2qjr5OY4gNtBS7Aa6EOAitX-6Fc2sFXFqw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-12 05:58:15,384:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-12 05:58:15,385:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:58:11 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/285341919627 Replay-Nonce: XrsdoYfrKSarBUiLE0wPerUnFCytj8Yd5geyoM92dv0TP4ww6kk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-15T04:13:07Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/285341919627" } 2024-07-12 05:58:15,385:DEBUG:acme.client:Storing nonce: XrsdoYfrKSarBUiLE0wPerUnFCytj8Yd5geyoM92dv0TP4ww6kk 2024-07-12 05:58:15,385:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:58:15,393:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJLU2FyQlVpTEUwd1BlclVuRkN5dGo4WWQ1Z2V5b005MmR2MFRQNHd3NmtrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzQxNTAyMDI0NDcifQ", "signature": "QUf414E-hj4EyLXStsbeYM0l8UZcfHU3XhN7XqI4gHf7MdVn5bjY5Z63fUU8KaTHoRfocRLUWlp5nuj8xsRp1sL1z21yhRgp9RDBHTnWKqMIHZcXJwt9avtc6ZbqhgzJg8XVStaTPyVJtWQr3Zaf-u_hYkRHNs-foetNwJS8f-J1N6ZHDxf3VoVSbfnQAnYYw8kBYvoI5h1WI17PefLP4nNwdkd_pWVzOxL4qIDx_VSuioGizBscdWmydiVHebZdXK-twrPnLdF_NaS69jQeKB4rDGKcRVIqVYKXK6IghmrCcM05uPerJnGWRE0os6JmWJ7veP8oRefKk4HKdxApGQ", "payload": "" } 2024-07-12 05:58:15,555:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/374150202447 HTTP/1.1" 200 807 2024-07-12 05:58:15,556:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:12 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJd2hHw2FXbPiDbKi3QHBhhIQHUmK9Dq7xYxHvidyXdUQo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-15T04:13:07Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/NY8rUA", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/R0qBhg", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/2vSv0A", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" } ] } 2024-07-12 05:58:15,557:DEBUG:acme.client:Storing nonce: 9v6OBnJd2hHw2FXbPiDbKi3QHBhhIQHUmK9Dq7xYxHvidyXdUQo 2024-07-12 05:58:15,558:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:58:15,559:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-07-12 05:58:15,559:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:58:15,560:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:58:15,562:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:58:15,562:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:58:15,562:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:58:15,563:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:58:15,565:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:58:15,607:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:58:15,813:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:58:15,814:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 05:58:15,815:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 05:58:15,819:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-12 05:58:15,819:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:58:15,820:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:58:15,828:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:58:15,829:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:58:15,829:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:58:15,833:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:58:15,834:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:58:15,836:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:58:16,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:58:16,287:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:12 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "H0w7AueUeAM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 05:58:16,289:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:58:21,389:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8380_key-certbot.pem 2024-07-12 05:58:25,851:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8378_csr-certbot.pem 2024-07-12 05:58:25,852:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:58:25,852:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:58:26,004:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:58:26,006:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR2XrC298GZWlRBWDmZ-9gUgIIMog29F7Zg011GgLkf-D4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:58:26,006:DEBUG:acme.client:Storing nonce: _jAl9GR2XrC298GZWlRBWDmZ-9gUgIIMog29F7Zg011GgLkf-D4 2024-07-12 05:58:26,007:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:58:26,016:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiX2pBbDlHUjJYckMyOThHWldsUkJXRG1aLTlnVWdJSU1vZzI5RjdaZzAxMUdnTGtmLUQ0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xLSOSf4_uyOLocA90MrDa23Se25bhOJ8xuMEJotCJVibMkLXgRXaofz-ISOs45PoSIOxv0box5EW06ljugr-4prmCPSfyPMC6FprePWiBzuDNwB4MDEKYKCXsLyAOjPEqA8UmF7YPnY_fN5yGdUcQlaApgeTJVAtMlKy3uwkDLQkgWZ4Ikd7ZbNV05Y7YpgEKlPbsUHIx99IWq07U176JJlolFCeqvNoInZkom3zE_4KTRjqcLmJtyHK2WJp-9sEJ0hYKq9HzHlmibge_596v9dwE4Qq67HfXJWQtp6VjOiXyxJ7T-G86QSOQQP2YYn9UkJbLDY4enGy3sALPit_Bw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-12 05:58:26,192:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-12 05:58:26,193:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:58:22 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042554147 Replay-Nonce: 0HjY_nENxr0uyNWBGAf-Gb9xeiDpToqx04_ilbVQKVAE3gS616w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:54Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183336527" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042554147" } 2024-07-12 05:58:26,194:DEBUG:acme.client:Storing nonce: 0HjY_nENxr0uyNWBGAf-Gb9xeiDpToqx04_ilbVQKVAE3gS616w 2024-07-12 05:58:26,195:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:58:26,201:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183336527: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU54cjB1eU5XQkdBZi1HYjl4ZWlEcFRvcXgwNF9pbGJWUUtWQUUzZ1M2MTZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMzMzY1MjcifQ", "signature": "un5dDAAdpXZger4TytkmElXzVCanAb3ydp6WD5eY-Fy2z66oAl-PFwvWlKe9Wm1Y_baAtadWtOs6-O3TxCkQhRLx1yM142zE_Nr1KuzoQwh_9PjxegrYVcYokUh9buxyByPH6Qbgs7fo8AQZhoJMJS0Boj6doh2t2czG88rASFgRc1gFp2HmCx2nwHKCjrZ27LgLBPzXZfaEv-pwIEg1dSQFDttyxCUzokSrAFgtaDRX9N7N53Wogl0Y4Ji_1OTvjk20DztDAzYhE3JpaV_jO52-RyH0qhfz7exbzxQgccpk4VTBiZgAGtEYw5_myP0-y4ZaYZjgT3DSiCNCEV2Clg", "payload": "" } 2024-07-12 05:58:26,356:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183336527 HTTP/1.1" 200 806 2024-07-12 05:58:26,358:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:22 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR2-Oos8roeiDc4lW28Gesaq2HtGjiQqtDnZm89dhGBMlc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:54Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/LtvPaA", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/uTcC3A", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/tbjSgg", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" } ] } 2024-07-12 05:58:26,358:DEBUG:acme.client:Storing nonce: _jAl9GR2-Oos8roeiDc4lW28Gesaq2HtGjiQqtDnZm89dhGBMlc 2024-07-12 05:58:26,359:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:58:26,360:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-12 05:58:26,361:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:58:26,362:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:58:26,363:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:58:26,364:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:58:26,364:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:58:26,365:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:58:26,367:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:58:26,417:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-12 05:58:26,417:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:58:26,417:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-12 05:58:26,424:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-12 05:58:26,426:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-12 05:58:26,426:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-12 05:58:26,426:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-12 05:58:26,427:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-12 05:58:26,428:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-12 05:58:26,469:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:58:26,661:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:58:26,663:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 05:58:26,665:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 05:58:26,674:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-12 05:58:26,674:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:58:26,675:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:58:26,680:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:58:26,680:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:58:26,680:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:58:26,685:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:58:26,685:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:58:26,687:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:58:27,135:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:58:27,137:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:23 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "aLBNvbJ4m8U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 05:58:27,138:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:58:31,776:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8381_key-certbot.pem 2024-07-12 05:58:36,276:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8379_csr-certbot.pem 2024-07-12 05:58:36,277:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:58:36,277:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:58:36,426:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:58:36,426:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR2jIlb-aT-2Ib5WDiHGhikneAmhTmWFMghBx2B_6RCSfA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:58:36,426:DEBUG:acme.client:Storing nonce: _jAl9GR2jIlb-aT-2Ib5WDiHGhikneAmhTmWFMghBx2B_6RCSfA 2024-07-12 05:58:36,427:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:58:36,434:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiX2pBbDlHUjJqSWxiLWFULTJJYjVXRGlIR2hpa25lQW1oVG1XRk1naEJ4MkJfNlJDU2ZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OJX_bSesqNIXBEKx6nhbn-6nGwXUTDjY9kHhYfdsjLGRnFLbTrw95-9h9eA97kB1JsE83Nc8wJD4E1DjXwmXt2VrsjfR727vzferXHMu6Mfjq_8iQ82FpC-p1KMsW7j1sJM2JS-shqPPuLtYjcmybX5_BEOSYMvVRTTUsLoK-WZXu1jkIojl7fWN0TtBknwjhD0V8uWQH4uRygZTwVwoE4JlT59TNi2xvj3MTLeZDlz21-ql65OonKvhXqw9IsuwS3V3nXJZMcHhW0fM7efSD6d2mhVLbJQ86qScccEFS3FHCw3b1XFKB1aB9gimge2RgrzRv5vNUvJUa29Yvvh8-Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-12 05:58:36,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-12 05:58:36,609:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:58:33 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042595287 Replay-Nonce: 0HjY_nENy58MePF-N7u_dF7uGl25D3beUhi3Lc-7lgA--DDZGMs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:05Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183394907" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042595287" } 2024-07-12 05:58:36,609:DEBUG:acme.client:Storing nonce: 0HjY_nENy58MePF-N7u_dF7uGl25D3beUhi3Lc-7lgA--DDZGMs 2024-07-12 05:58:36,610:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:58:36,620:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183394907: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU55NThNZVBGLU43dV9kRjd1R2wyNUQzYmVVaGkzTGMtN2xnQS0tRERaR01zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMzOTQ5MDcifQ", "signature": "Xbo5cIKMDW5gZd-c0K-8e34qtrwZJK-67F_hk2E3dMzB7d9uxts1aJB4a0o1FvRJ9cUqnUqGX7rszuXg4ie1Enf35R86Pyf9TbmnOUJYG77bAviXK6XsvDP0Vc_durqY35p7tV3Ny02Lyz2gKQ0n-40uODb3KEWd3anBOBCEqsTSCRxYvTgJ56SmJ7ksozs-7UWlZysBouPL16F_Bn9Pz8Zfyi5LDmCCEs2iHW2RNy8HU0lreNn9Pwcq48p-1udUvW76gjmp8hb7VmPAV_83E7-Aalxu4Pm_JQjdjrMxmjF9CLRym_xmNAOomosE_wFMyd080upKk3DriofmuntrAg", "payload": "" } 2024-07-12 05:58:36,778:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183394907 HTTP/1.1" 200 811 2024-07-12 05:58:36,779:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:33 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR2GymABWMiE4vpnXGLW_rJtcmwI330y0dWrty1CX8Y5Ys X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:05Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/78vQQw", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/p4w28w", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/j5xMwg", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" } ] } 2024-07-12 05:58:36,779:DEBUG:acme.client:Storing nonce: _jAl9GR2GymABWMiE4vpnXGLW_rJtcmwI330y0dWrty1CX8Y5Ys 2024-07-12 05:58:36,781:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:58:36,781:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-12 05:58:36,782:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:58:36,782:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:58:36,783:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:58:36,783:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:58:36,784:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:58:36,784:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:58:36,785:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:58:36,835:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:58:37,048:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:58:37,049:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 05:58:37,050:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 05:58:37,055:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-12 05:58:37,055:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:58:37,055:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:58:37,060:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:58:37,061:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:58:37,061:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:58:37,080:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:58:37,082:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:58:37,085:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:58:37,571:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:58:37,573:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:34 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "lyx8lbOpsjw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 05:58:37,574:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:58:42,539:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8382_key-certbot.pem 2024-07-12 05:58:47,065:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8380_csr-certbot.pem 2024-07-12 05:58:47,066:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:58:47,066:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:58:47,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:58:47,228:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:43 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdkJMMcOwt1PH2558iRwloeE7-U4DMF5nV34IrbuudTAA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:58:47,228:DEBUG:acme.client:Storing nonce: 9v6OBnJdkJMMcOwt1PH2558iRwloeE7-U4DMF5nV34IrbuudTAA 2024-07-12 05:58:47,229:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:58:47,240:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOXY2T0JuSmRrSk1NY093dDFQSDI1NThpUndsb2VFNy1VNERNRjVuVjM0SXJidXVkVEFBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "LkRedJf8MDSEKNykdBUywg2G7K2ljoC6NfJYWNBpeblcdY1ymwazNzpwLqS8I9_rrbAX1VU2ckBFy-skdtt7VqSjBtYXJKurzWV32FN-iHNphm2wuoNiCRlwBOkNEhLhg7EtRjM86pYPhgIUuB0h42ORPGJxSXaHcfzLiJDeS8nUNt1lwIYjzDRg5PZYsTjm5WoLJfFjnQXiJ5WXlzyQGJs1SK47c0-zeJiI_gYKJPmwbXlqeW2Ru3qyDgMCug6b2fQUCQgIM89s_Oz_dXaySbVa64rNVx1PN74OS8j6IeoM7dd9wtWf79NATZeVM5iL1T9zatFiOfxjshcEcG8Dkg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-12 05:58:47,483:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-12 05:58:47,484:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:58:43 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042636517 Replay-Nonce: 9v6OBnJd4kMCZFgemB3bjkocJvFG1-ca3Ec098o1tCR5tl2Hs24 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183457817" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042636517" } 2024-07-12 05:58:47,484:DEBUG:acme.client:Storing nonce: 9v6OBnJd4kMCZFgemB3bjkocJvFG1-ca3Ec098o1tCR5tl2Hs24 2024-07-12 05:58:47,485:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:58:47,492:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183457817: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOXY2T0JuSmQ0a01DWkZnZW1CM2Jqa29jSnZGRzEtY2EzRWMwOThvMXRDUjV0bDJIczI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM0NTc4MTcifQ", "signature": "PuGruITf3gwLoZcsDsk5GAtcBAoSSUfgmSrIWvVnqQ9jdmiY0VMzZiSyfUk4SlVmotsF6LtiZiLdi-Xfs9iEkpgqrIVmmnRUNACzpeXeobSkAlX-VmpzT2DpAvDmkCv9rP3Lx8QWMIJJse-dH_bj5Gz3vaC2WgnNpYqOwL3uXRSNSF3UZlhm0h6hNBrd-aMrYXdk2S9bAxLpS5dOVnUyRnyoTCqa_FWg0B2cUa5bcOcvRCcHhaaH_ZkQr0OkFg05f0QuUigjxUIrgKDOpWdrTSIJC4FmDSW2Jo6e0AE_YyQFGWdKOZ4-E8HF-xJt4T81elpN0cwmSd_xUsGWpEvAiA", "payload": "" } 2024-07-12 05:58:47,657:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183457817 HTTP/1.1" 200 810 2024-07-12 05:58:47,657:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:44 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfruB9n1XsFB70DjtvLsQwRsrP368NJuG_NiEX_MiNVmG0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/RejdSQ", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/r4Hc4w", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/l3Nghg", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" } ] } 2024-07-12 05:58:47,658:DEBUG:acme.client:Storing nonce: XrsdoYfruB9n1XsFB70DjtvLsQwRsrP368NJuG_NiEX_MiNVmG0 2024-07-12 05:58:47,658:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:58:47,659:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-12 05:58:47,659:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:58:47,659:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:58:47,660:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:58:47,660:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:58:47,660:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:58:47,661:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:58:47,662:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:58:47,707:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:58:47,901:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:58:47,903:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-12 05:58:47,904:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-12 05:58:47,913:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-12 05:58:47,913:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:58:47,913:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:58:47,918:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:58:47,918:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:58:47,918:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:58:47,923:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:58:47,924:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:58:47,926:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:58:48,367:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:58:48,369:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:44 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_JCaJKeL4oA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 05:58:48,370:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:58:53,637:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8383_key-certbot.pem 2024-07-12 05:58:58,169:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8381_csr-certbot.pem 2024-07-12 05:58:58,169:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:58:58,170:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:58:58,315:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:58:58,317:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR2Ku4QwJ8QqSwpfmfHgZ_rmExxHwJ6R5HaLnljTzp-z_Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:58:58,318:DEBUG:acme.client:Storing nonce: _jAl9GR2Ku4QwJ8QqSwpfmfHgZ_rmExxHwJ6R5HaLnljTzp-z_Y 2024-07-12 05:58:58,318:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:58:58,327:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiX2pBbDlHUjJLdTRRd0o4UXFTd3BmbWZIZ1pfcm1FeHhId0o2UjVIYUxubGpUenAtel9ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "f28iIhxDv8rl1yRp1Fkifxie9ENV9pF_8qwxgHllQvA4TWOWBJSsnR5pL_XpMtATrYLI6vfQY6O55ZOuigew_s5B1nhrYmFs9JXHeaYnn4j-PrEIL8FjReP2d9CLOHeE0cuz0aDz_QpQedIPJTWI0g36ZqoAzmmYMQ-AQi4PAN2mQfhktR9bHnvYDI-j2u4FZb8Rqp2HKcAwgzK988ccA26jeiFQaGENhlAg8QVO2W6BsUukU-LCrdWHf55z60ehjj-UnhWMRXW_DPMzwLdx8wFGYjSro5nIuxrmUmpZHqRvqPW0hCVJt05hngm_hBP6sOwL-1q7o4MdXyWLnLJkvg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-12 05:58:58,488:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-12 05:58:58,490:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:58:54 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042672187 Replay-Nonce: 0HjY_nENldWk0M3M4HqDy0Y5VlBbvD6y5B10lJlsJkcneZHgB6Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:27Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183510157" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042672187" } 2024-07-12 05:58:58,490:DEBUG:acme.client:Storing nonce: 0HjY_nENldWk0M3M4HqDy0Y5VlBbvD6y5B10lJlsJkcneZHgB6Q 2024-07-12 05:58:58,491:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:58:58,504:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183510157: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMEhqWV9uRU5sZFdrME0zTTRIcUR5MFk1VmxCYnZENnk1QjEwbEpsc0prY25lWkhnQjZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM1MTAxNTcifQ", "signature": "YOij-7xHej-ec6TAaQbWQX0FdCO7Alq1n6GbwyuKdsr9o3nX5TMmfCIBYjSYobKwg_GYa51O5kJY8TpkPY507dMo277oCOoAXP0xcAZU1LQc_YhMrO9Dtfb2vVGtEzvl7yqWrlm1JCWk5-vKrTrTRtydTbn0-UPZKyHSTec1QXyr37T-TanDSADUog8RrvUcKyrwEASFlSBvWD-DpiKUAaJqWB_8RN-yi4hBOuXdbdiFhk9i8TzvtN3CbuV97-V0CjzaTzzV6uY59euDBpRjdKEuHJSH3V4-hWfI5yoYcVmG46XO8UbY6xZfsxeWcoL88FH-jbRpXYB1idxNGwai3A", "payload": "" } 2024-07-12 05:58:58,659:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183510157 HTTP/1.1" 200 809 2024-07-12 05:58:58,660:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:55 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: _jAl9GR2uTNPhCeqm4gkYwTwtj6TjNN4sNSRvGbsOuV-2I6RxiM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:27Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/9E6R1w", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/8v5Buw", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/2WSNJg", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" } ] } 2024-07-12 05:58:58,660:DEBUG:acme.client:Storing nonce: _jAl9GR2uTNPhCeqm4gkYwTwtj6TjNN4sNSRvGbsOuV-2I6RxiM 2024-07-12 05:58:58,661:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:58:58,661:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-12 05:58:58,662:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:58:58,662:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:58:58,663:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:58:58,663:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:58:58,663:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:58:58,664:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:58:58,665:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:58:58,714:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:58:58,944:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:58:58,945:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-12 05:58:58,946:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-12 05:58:58,950:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-12 05:58:58,950:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:58:58,950:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:58:58,955:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:58:58,956:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:58:58,956:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:58:58,960:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:58:58,961:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:58:58,963:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:58:59,446:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:58:59,446:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:58:55 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "lzOkelto0QY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 05:58:59,447:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:59:04,044:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8384_key-certbot.pem 2024-07-12 05:59:08,533:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8382_csr-certbot.pem 2024-07-12 05:59:08,534:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:59:08,534:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:59:08,695:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:59:08,696:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:59:05 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfrtXfDIOVALcecXMyWZUC5x1b0LpxmZt3618dPekz04KQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:59:08,696:DEBUG:acme.client:Storing nonce: XrsdoYfrtXfDIOVALcecXMyWZUC5x1b0LpxmZt3618dPekz04KQ 2024-07-12 05:59:08,697:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:59:08,708:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJ0WGZESU9WQUxjZWNYTXlXWlVDNXgxYjBMcHhtWnQzNjE4ZFBla3owNEtRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ETGAN6eaAxIIN6MQivVRqPULY67AAoQpCZwZdc9FrawafDkvyJsf31pCoxI36Ghgaz3ZslmMVbeQU6-150yQ1syItbBmLyNxd7K4rhzkIJuIkDIfhgb6FG93JRx32ZbDqQ82doA-lnNTVJhW6VnpC3bxcHBR7z5J9c_jkJVuVGyS-x84aNGhogn7HPQa47NKPDz_iitYNrZAYbBQBanI2_Q_uwNORac5A4O2yemsxxCgWP5G1lV9ObKnfEsb02XGwyF8XSTeOFbJZDXlgonPq6WyODMxU7x19ikEtH4n6WbBpGsxkuaZNhkL5qo5wz56k6S9YkbqSLwD32t0yk9Jfg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-12 05:59:08,894:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-12 05:59:08,896:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:59:05 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042704307 Replay-Nonce: XrsdoYfrPcgDdtVkMdDC2m34tRQgQw0CuoPr52XeThPTTIhcRPo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:37Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183559397" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042704307" } 2024-07-12 05:59:08,896:DEBUG:acme.client:Storing nonce: XrsdoYfrPcgDdtVkMdDC2m34tRQgQw0CuoPr52XeThPTTIhcRPo 2024-07-12 05:59:08,897:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:59:08,903:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183559397: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJQY2dEZHRWa01kREMybTM0dFJRZ1F3MEN1b1ByNTJYZVRoUFRUSWhjUlBvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM1NTkzOTcifQ", "signature": "S-nA3EgxFfTsO_lG2Bw1lajsPGHsv4KOoEU5p8kfz7wa7wDLpFj2vukBEU4XV8xAjWCMM0ovbwnvFTZS1QVRlnEdY3FWlK6Egxn3ga_9tWw1vLEFvurFFX_SviGZ-W2bhvETyL3eFEeosKU5HYQWzoDXa0qNqZpeJGg3X--x10ZvWDeo_BIB_Qsua5Jdl6keHY7ZUuIpf4VPqCLN8-NnxruGv75cNCZRnriYfGh53q-ck9YJEqIEGgKoY4rc79CIlNUdvqXC9-HRjUfdpQvipge2fxejBVDXOF4PsY2-EPj56G_LhDk5YwIqP9i_3PrG1Sj3g1KTMMAbxCNAToN82Q", "payload": "" } 2024-07-12 05:59:09,068:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183559397 HTTP/1.1" 200 805 2024-07-12 05:59:09,070:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:59:05 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfr3ph-zgwoOzK9w7bUYFBQndD8Y4xYp_eGXrodEbiifx0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:37Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/8Y1D2A", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/nFVVvA", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/ITyESg", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" } ] } 2024-07-12 05:59:09,070:DEBUG:acme.client:Storing nonce: XrsdoYfr3ph-zgwoOzK9w7bUYFBQndD8Y4xYp_eGXrodEbiifx0 2024-07-12 05:59:09,071:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:59:09,072:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-12 05:59:09,073:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:59:09,073:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:59:09,075:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:59:09,076:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:59:09,076:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:59:09,077:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:59:09,079:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:59:09,127:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:59:09,354:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:59:09,355:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-12 05:59:09,356:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-12 05:59:09,360:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-12 05:59:09,361:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:59:09,361:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:59:09,366:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:59:09,366:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:59:09,366:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:59:09,370:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:59:09,371:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:59:09,373:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:59:09,858:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:59:09,860:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:59:06 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_X48MTlZDmU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-12 05:59:09,861:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:59:14,577:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8385_key-certbot.pem 2024-07-12 05:59:19,069:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8383_csr-certbot.pem 2024-07-12 05:59:19,069:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:59:19,070:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:59:19,231:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:59:19,232:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:59:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfrpe9H4oM34cvRVL-Y-Ev94Wxl0WnM3M4DyYkuYgP4BCQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:59:19,233:DEBUG:acme.client:Storing nonce: XrsdoYfrpe9H4oM34cvRVL-Y-Ev94Wxl0WnM3M4DyYkuYgP4BCQ 2024-07-12 05:59:19,233:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:59:19,239:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJwZTlING9NMzRjdlJWTC1ZLUV2OTRXeGwwV25NM000RHlZa3VZZ1A0QkNRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "IpWp3LRspcbJdUw4GSXSd-aSkC_kGZhOq3RwOLeQK_LC8A0KFZkmeFJjaY9YoDmvsIz6YMp218mzPBYuUc_hRfaBbs5ehbz2hEYl0MBAZHBhSxOjHDSqwIxWCTWCtltMU-zcRLuNvPZ01dVUIn6S6dSpAoAsShqp210yHKPZf9XTXGkF9LXXuTvAieg7J6GTRbHU4XDovDACoFbY2v9xsIC2VgwwLgjVT6ddMJcuDY66j-xepwKeh9RgUdxiydYIcLo9SHrQB-L-sP6RkqHtnaOkdUgNTunyZptw-i9emGC8dbEczuhVmukt008Lft5ae8k940Tp1uT2gw6R2-dsmg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-12 05:59:19,422:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-12 05:59:19,424:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:59:15 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042741137 Replay-Nonce: 9v6OBnJd6qccgxHTf7QkwwS7jbITX1d7VMSbqvzs9_HXcTkEPAs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:49Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183613287" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042741137" } 2024-07-12 05:59:19,424:DEBUG:acme.client:Storing nonce: 9v6OBnJd6qccgxHTf7QkwwS7jbITX1d7VMSbqvzs9_HXcTkEPAs 2024-07-12 05:59:19,425:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:59:19,433:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183613287: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOXY2T0JuSmQ2cWNjZ3hIVGY3UWt3d1M3amJJVFgxZDdWTVNicXZ6czlfSFhjVGtFUEFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM2MTMyODcifQ", "signature": "RRlNqlLtF4e8xNmBDFl5NqoQF_dv1dI2ndguqZIBZeU0uQtErvtPcDO0kXdJPx2wkBttaedlkaxI60saQ6DxrZU1hgPYUmL72O0hPM-ZW3omTDg4Z3-Jm5mNhKLVI004GmEVAp89PEgSxEsQEpraWLCjxVLNJoEWOuupEtaBh2tYQELinak8TPQEbreUHmVQIHrTV0p7CAeFt2BkCCS7Ur3gFreOuICmP7d6AhpPvbZ60yPQAUUJ4nrmU2UbGUbwNF60G2bFTmqe1P7ktSz-2L6yLVQyBS31bryg2QXz12rVylIJO007i8454O_PlKfHEv0okpkseluJok3zXvvV7g", "payload": "" } 2024-07-12 05:59:19,595:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183613287 HTTP/1.1" 200 805 2024-07-12 05:59:19,596:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:59:16 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 9v6OBnJdVpI6_GvSdoM4XJvk_5GoRkwwLssfK-KbZH5jFecBDpo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:49Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/Dj3vNw", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/EcZFOg", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/OjEpqw", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" } ] } 2024-07-12 05:59:19,596:DEBUG:acme.client:Storing nonce: 9v6OBnJdVpI6_GvSdoM4XJvk_5GoRkwwLssfK-KbZH5jFecBDpo 2024-07-12 05:59:19,596:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:59:19,597:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-12 05:59:19,597:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:59:19,598:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:59:19,598:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:59:19,598:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:59:19,599:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:59:19,599:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:59:19,600:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:59:19,650:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-12 05:59:19,882:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-12 05:59:19,883:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-12 05:59:19,884:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-12 05:59:19,889:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-12 05:59:19,889:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-12 05:59:19,890:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-12 05:59:19,895:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-12 05:59:19,895:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-12 05:59:19,896:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-12 05:59:19,900:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-12 05:59:19,901:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-12 05:59:19,903:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-12 05:59:20,383:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-12 05:59:20,383:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:59:16 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "udfxvwxO1-0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-12 05:59:20,384:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-12 05:59:24,956:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8386_key-certbot.pem 2024-07-12 05:59:29,406:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8384_csr-certbot.pem 2024-07-12 05:59:29,407:DEBUG:acme.client:Requesting fresh nonce 2024-07-12 05:59:29,407:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-12 05:59:29,568:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-12 05:59:29,570:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:59:26 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfrB-trD5ye6ArnbSAZ8vpF0Nbj42LZKvHpZSUebxnAII4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-12 05:59:29,570:DEBUG:acme.client:Storing nonce: XrsdoYfrB-trD5ye6ArnbSAZ8vpF0Nbj42LZKvHpZSUebxnAII4 2024-07-12 05:59:29,571:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-12 05:59:29,584:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWHJzZG9ZZnJCLXRyRDV5ZTZBcm5iU0FaOHZwRjBOYmo0MkxaS3ZIcFpTVWVieG5BSUk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jwAVjAnLKK82YI7mlf7O2Fx4Swg2BkjI5YaGjn5v59LQlFetOqGWFxy5Ox-kNifNYokp65SY_Rc_87y43Jzdciuk5s2wz8VKmrFDSf9v01DdiR7vEjlwBGKHEcakW7uuVZ9T___x_YVosfUeerC-rO7wjNOOBqGrDrWeyuc3aLm4sGK4ikH-MoATb1ZWonHcCB8774QOVOVXEP5K-L8xX7Iex9BG2R6sbZ3dWzBe92ii-Ksv7ufEmigMxfClHe9lBG7XLRTX1gkSyz34Pa0qKZyCS4HfMisM_MbMjZFD6EdePJ2ekuTwLTpjtDMNseRoGgeuhHGJAo2X9qLbCAk7Yg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-12 05:59:29,768:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-12 05:59:29,769:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 12 Jul 2024 03:59:26 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042772467 Replay-Nonce: 9v6OBnJddjmP3FnZZd0tWy9Bt3CeccDUVLaMjPv0pQbr0CFzE3E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:59Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183661077" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042772467" } 2024-07-12 05:59:29,769:DEBUG:acme.client:Storing nonce: 9v6OBnJddjmP3FnZZd0tWy9Bt3CeccDUVLaMjPv0pQbr0CFzE3E 2024-07-12 05:59:29,769:DEBUG:acme.client:JWS payload: b'' 2024-07-12 05:59:29,775:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183661077: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOXY2T0JuSmRkam1QM0ZuWlpkMHRXeTlCdDNDZWNjRFVWTGFNalB2MHBRYnIwQ0Z6RTNFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM2NjEwNzcifQ", "signature": "OJS32ixG4_fGDVf9PLUPCQCNODTzgT9RkRhrwPyEnoI0rQYhP0o1uRmRBkaJ0kzaMSCKmu3acsJG8LXI3uvwd1CcnVwYCZu1WMUrlTTMqz8HnBDPOFp7gKIgQGAFGm-nggopyvgNLxnnonFifB_8yvyOnzRnv3pn_lEPnIQcCE_7OK7Q7PF2D-tZZeyzVI2T6oAB9ranIrpJs9c-sTDsFjk-BGm15b8q6slQFqBMit8_cVdREy4pMGgO8LISsFCTtj00xDHXk3fwY9zXOdwkDDdjnGRKWGx7abc_Ws112uRAMNyy3MATLl4qrl7udyqEUEuG9FVAxAe3maxN2K3FkA", "payload": "" } 2024-07-12 05:59:29,941:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183661077 HTTP/1.1" 200 805 2024-07-12 05:59:29,942:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 12 Jul 2024 03:59:26 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: XrsdoYfrE9lq-ULRSKvlUBriM48blKFrj16KQVYSf-fNrCzZAIU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/mMPmZA", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/oiTplA", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/6s0vLQ", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" } ] } 2024-07-12 05:59:29,942:DEBUG:acme.client:Storing nonce: XrsdoYfrE9lq-ULRSKvlUBriM48blKFrj16KQVYSf-fNrCzZAIU 2024-07-12 05:59:29,943:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-12 05:59:29,943:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-12 05:59:29,944:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-12 05:59:29,945:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-12 05:59:29,947:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:59:29,947:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-12 05:59:29,947:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-12 05:59:29,948:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-12 05:59:29,949:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-12 05:59:29,949:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-12 05:59:29,950:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-12 05:59:29,963:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-07-12 05:59:29,964:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)