2024-07-11 20:27:12,428:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-11 20:27:12,428:DEBUG:certbot._internal.main:Arguments: [] 2024-07-11 20:27:12,428:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-11 20:27:13,217:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-11 20:27:13,217:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-11 20:27:13,257:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-07-11 20:27:13,299:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:27:13,581:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:27:13,593:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-11 20:27:13,609:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-11 20:27:13,617:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-11 20:27:13,617:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:27:13,618:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:27:13,623:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:27:13,623:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:27:13,623:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:27:13,630:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:27:13,631:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:27:13,633:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:27:14,124:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:27:14,125:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:10 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Ve4kEU3sAGE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:27:14,126:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:27:20,203:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8359_key-certbot.pem 2024-07-11 20:27:25,410:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8357_csr-certbot.pem 2024-07-11 20:27:25,411:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:27:25,411:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:27:25,567:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:27:25,568:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UQIDXCoVF8lVrxyuMnFNWvAf9xEzcQjAhrPC3aox1geA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:27:25,568:DEBUG:acme.client:Storing nonce: eFSVlf8UQIDXCoVF8lVrxyuMnFNWvAf9xEzcQjAhrPC3aox1geA 2024-07-11 20:27:25,568:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:27:25,574:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVRSURYQ29WRjhsVnJ4eXVNbkZOV3ZBZjl4RXpjUWpBaHJQQzNhb3gxZ2VBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "w7aVbJS7X8Quy08i0wNFRsmIj2aFKyVFhnms5UiMie-vi_8Dw3UffaAyyyDsnhUHSG15XLaw-fSAcE0iJPI2BNtAzsp9SzCH4jJSkRrC2-I4DLE1SBBUSjBDcc-OEhqavnTPSHVURBV3sHxTcKrvs1TYR4kf6v-LhxQz-7JxBlipENSiXGwxTmFEoG7y9FTuBQL4GdsrxV_H8hjphOunzmaK0fsjmkV0nIaWHwi-416ik2_n-DW6gogh6V5Jh5J0CLCH2jS9t_nnVzJa3kpO7wtQIeNEPvYFOtBCrz39jkvnBP2Yt4OK_23K4zYOAlAJa96yRn9BbQWm9aC2QPnXqg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-11 20:27:25,768:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-11 20:27:25,770:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:27:22 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042282867 Replay-Nonce: eFSVlf8Ua6yTE6jtKRLkGMLkN-dfJ2fSXZWdGV7hxXfnW_Yc7wQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:36Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182938057" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042282867" } 2024-07-11 20:27:25,770:DEBUG:acme.client:Storing nonce: eFSVlf8Ua6yTE6jtKRLkGMLkN-dfJ2fSXZWdGV7hxXfnW_Yc7wQ 2024-07-11 20:27:25,771:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:27:25,777:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182938057: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVhNnlURTZqdEtSTGtHTUxrTi1kZkoyZlNYWldkR1Y3aHhYZm5XX1ljN3dRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODI5MzgwNTcifQ", "signature": "tO25a7hWGlS7mllBkhrKHREqClh5iFo9A9FGW-8Zn0B5rrxzNFZTYbDhWnG1Dn4FMRV0OysQsLuI1N6lpp-6kFsyqhBRGHxY3f6KLRnj6dctCxEH6t-h6JHIESpL8JiVD40SwtXOoCDpPL8SKYDcYv4dJnqf-ZHUl5NB-eFBywatmYYt2wm9CUjBKzYU1c7_MKlF_YvtyEN20XXM9QQQaUlCAmHSYmxNHku46nh_EVO1Akift8x6Gadj_bqjjZvQK6jjMZrB2ikr84d_HWpDr3fG27HCwziW9Bi8_aAd6wE-rC39aPA7WqLIvvxfv0Tf8IWzceLTwymRfkr-nPoTow", "payload": "" } 2024-07-11 20:27:25,940:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375182938057 HTTP/1.1" 200 810 2024-07-11 20:27:25,941:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:22 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-ZHuvB3su4PcVUp6dLZ1TpBquj_41AKlOgk6kmJRSJeE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:36Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/gtbErw", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/uhlVRg", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/KhzwYg", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" } ] } 2024-07-11 20:27:25,941:DEBUG:acme.client:Storing nonce: zgT1AlV-ZHuvB3su4PcVUp6dLZ1TpBquj_41AKlOgk6kmJRSJeE 2024-07-11 20:27:25,941:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:27:25,942:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-11 20:27:25,942:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:27:25,942:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:27:25,957:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:27:25,957:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:27:25,957:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:27:25,958:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:27:25,962:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:27:26,001:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:27:26,208:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:27:26,211:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 20:27:26,213:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 20:27:26,222:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-11 20:27:26,223:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:27:26,223:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:27:26,228:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:27:26,228:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:27:26,228:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:27:26,248:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:27:26,249:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:27:26,253:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:27:26,709:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:27:26,710:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:23 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LzayVSHNefU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:27:26,710:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:27:31,587:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8360_key-certbot.pem 2024-07-11 20:27:36,237:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8358_csr-certbot.pem 2024-07-11 20:27:36,238:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:27:36,238:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:27:36,386:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:27:36,387:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6aZkjP-4w05ZM85iE35ZLX5kQKpY65qLLppNPkRIQpB8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:27:36,387:DEBUG:acme.client:Storing nonce: oPjXeLW6aZkjP-4w05ZM85iE35ZLX5kQKpY65qLLppNPkRIQpB8 2024-07-11 20:27:36,387:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:27:36,394:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZhWmtqUC00dzA1Wk04NWlFMzVaTFg1a1FLcFk2NXFMTHBwTlBrUklRcEI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "yOVXn9Z9oxiEhZ5behBIe9ilxnGMkIM13PL1ifa70KZiY9CDyYZNLR_GA-DglwG4CuogUCMhV5DbdSGO6wOUyE1INnyVmdd6gP4rm8Hr12Ak4Nj7WExva6VDZQFS4rFOLSkdSZcAUgIlpThX7JZ5iWutDDyGc1UMPOZllewA5NcDZYTAYrbSjAL0fZZb330QlENSonVBg8O12l66B9WyB_OlD0Vz8OxMGvpODt2G_hpYUizmuy3YiI3e1mTpE17F3d4NeZHUQ_A-mSXLIjrw6KB9jy2iIDgIDuirmDqicAo9ha4SMZdKAooPNrgyTmU3bXEUetgN5r7cmXeEU1bdYw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-11 20:27:36,657:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-11 20:27:36,659:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:27:33 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042319787 Replay-Nonce: oPjXeLW6Lmocvgoc_mQR1WHeilnXdWVhMkU3SSX7s55gxqTUYyg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:48Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182994777" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042319787" } 2024-07-11 20:27:36,659:DEBUG:acme.client:Storing nonce: oPjXeLW6Lmocvgoc_mQR1WHeilnXdWVhMkU3SSX7s55gxqTUYyg 2024-07-11 20:27:36,660:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:27:36,667:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182994777: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZMbW9jdmdvY19tUVIxV0hlaWxuWGRXVmhNa1UzU1NYN3M1NWd4cVRVWXlnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODI5OTQ3NzcifQ", "signature": "szuF7BFs276J6fGiB4swKIvoaiJcnU0NXSTzDSRvSW0Pab4mSkTd_AddvTNIWCWDKTeoYNvOzDZ6w7lgcGBTGj3uD0DjkCYOkyUY4hRPdpeJYMai59F05IkWUOf3GZzOLj1WNr_8znEflG4gqrKPMCb3hPSge03i6yqwcWIoWmENGzXYpuVC11bNaT0E-6zm5582HWKlEaymmPN9NLTqK544S94NFk9YWSwX2UgMK2F9HSjQUCh1CPZqj8nsEBpKHj83ht2KwRMsEWWybr2lCW9Y0CAMadp4CHL2JJybTmMJF9JiBLU2W5tjKyUFGhDFXz41OX74M7pu56uOzDyJTQ", "payload": "" } 2024-07-11 20:27:36,821:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375182994777 HTTP/1.1" 200 804 2024-07-11 20:27:36,822:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:33 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqXigDg7RPHl7BJtQN9yNB7ZOwn5TjWAcL7loxCzgqScw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:48Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/Qwv2DQ", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/7TjcFQ", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/hJdTTw", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" } ] } 2024-07-11 20:27:36,822:DEBUG:acme.client:Storing nonce: EPg6kJgqXigDg7RPHl7BJtQN9yNB7ZOwn5TjWAcL7loxCzgqScw 2024-07-11 20:27:36,822:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:27:36,823:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-11 20:27:36,823:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:27:36,824:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:27:36,824:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:27:36,824:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:27:36,825:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:27:36,825:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:27:36,826:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:27:36,880:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:27:37,083:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:27:37,085:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-11 20:27:37,086:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-11 20:27:37,090:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-11 20:27:37,090:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:27:37,091:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:27:37,096:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:27:37,096:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:27:37,096:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:27:37,111:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:27:37,111:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:27:37,113:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:27:37,563:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:27:37,564:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:34 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1ZZXXMSXn3Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:27:37,565:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:27:42,394:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8361_key-certbot.pem 2024-07-11 20:27:47,062:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8359_csr-certbot.pem 2024-07-11 20:27:47,063:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:27:47,063:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:27:47,212:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:27:47,213:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqdVBhtaF4aaDaIii9eS_0NsJGHmS7kAnopEMZVbS2Eu0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:27:47,213:DEBUG:acme.client:Storing nonce: EPg6kJgqdVBhtaF4aaDaIii9eS_0NsJGHmS7kAnopEMZVbS2Eu0 2024-07-11 20:27:47,213:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:27:47,219:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FkVkJodGFGNGFhRGFJaWk5ZVNfME5zSkdIbVM3a0Fub3BFTVpWYlMyRXUwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sFSfG096WwW4chNxRCePQ5L-ceJrNm1umVIqCWpqWRoNQLUX3jvOAiN51JL4qBNYlIt0Ai6P3n932uJaX2XQxnLQo7rrNh7TnQPFqNisfRNnCAlSq9_rXV2VyuY9PosbLAvRMAt9_R6mCFQ7APilU9aRVZxh42FyEaVGkKaY3XJ6t9dhgHE1DyY34pa97jP86zBhizXAnUJlesCpEJTdMpmU65rXbFN371mm8RvqYP3nvuobTeuAkXXi2DHlPceal5vqKB7eleHF9osfc0MOxAglokUjwkcLKyRz7fJaLO8-OBQCmI0cdD2JqNS_9DSY5xComj1k5jbZVuWUJxXiJw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-11 20:27:47,398:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-11 20:27:47,398:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:27:44 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042354327 Replay-Nonce: EPg6kJgq4j-6rugNDtdjizHo3XP23GpXBx7D3NbXgsE6UlwdfDg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:59Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183044847" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042354327" } 2024-07-11 20:27:47,399:DEBUG:acme.client:Storing nonce: EPg6kJgq4j-6rugNDtdjizHo3XP23GpXBx7D3NbXgsE6UlwdfDg 2024-07-11 20:27:47,399:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:27:47,405:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183044847: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3E0ai02cnVnTkR0ZGppekhvM1hQMjNHcFhCeDdEM05iWGdzRTZVbHdkZkRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMwNDQ4NDcifQ", "signature": "HJENhkAwAs12OhcqL6Msf-7bVDm2NzgenTpYgBWnWCP96YAXgvrDwAM955ruSS83ujTT4sjH9QcjYJHsQLf0-hnqTyTUL8PYm5axkHS50AoQziYHLy5dVvBZh3p-VY15xLvdeXi8gi4rlKiZGDBVNK4i0OlDM9x9MSdlGLLYI45GsaJYd3Rtw8GLXL5WyM9Zrxd--NzCIU-zw5hmOpyzrp6UKL0jH7wroyjB6u0a2XXMeKENLGpwLT5Zr2dCnks-7p0XLkxQDh4vQot_0gpjD6RUzEZOZ56NbeCLiK1wnNCzhWpaDSsnpQBZcpU2r9YFY8uJVMGmDQn_RQU7_XmkLw", "payload": "" } 2024-07-11 20:27:47,560:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183044847 HTTP/1.1" 200 807 2024-07-11 20:27:47,561:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:44 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgq5OiIhhNCFSB8kO8vYsHNl-2igbdcPlnjz12bT8NaVkc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/MqkCfA", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/OGQ48g", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/eU6s8Q", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" } ] } 2024-07-11 20:27:47,561:DEBUG:acme.client:Storing nonce: EPg6kJgq5OiIhhNCFSB8kO8vYsHNl-2igbdcPlnjz12bT8NaVkc 2024-07-11 20:27:47,562:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:27:47,562:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-11 20:27:47,562:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:27:47,563:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:27:47,564:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:27:47,564:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:27:47,564:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:27:47,564:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:27:47,565:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:27:47,620:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:27:47,893:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:27:47,894:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 20:27:47,895:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 20:27:47,900:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-11 20:27:47,900:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:27:47,901:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:27:47,906:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:27:47,906:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:27:47,906:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:27:47,924:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:27:47,926:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:27:47,929:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:27:48,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:27:48,414:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:45 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "mXC6aUNNJa0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:27:48,414:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:27:53,716:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8362_key-certbot.pem 2024-07-11 20:27:58,386:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8360_csr-certbot.pem 2024-07-11 20:27:58,387:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:27:58,387:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:27:58,549:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:27:58,551:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-KqI9wsnicmGmrsG45UAk5h7WHi5QHG6IRrtiYplQOtc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:27:58,551:DEBUG:acme.client:Storing nonce: zgT1AlV-KqI9wsnicmGmrsG45UAk5h7WHi5QHG6IRrtiYplQOtc 2024-07-11 20:27:58,552:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:27:58,564:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1LcUk5d3NuaWNtR21yc0c0NVVBazVoN1dIaTVRSEc2SVJydGlZcGxRT3RjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iF-0CkHgyoIEdqPGyXYgdSvRiNxKLtdUIQEp-WBgdiNKgPhvJL7rGP-tmkRvjVTt0BnvDx4-QkQG7keOv2ePswElozgEZzSKGHyuquUgWUFc-KX4eUmyh1giMvIAKgmDjmONeFXAxNwPn0oGNfwHEjtgpJ-y6O-2hSjfOr7HU5-uqfEVX6CjS5_UDFJBfjctXmPhBk1GvQ_x7_mmo680wL6gorfLoljiYqPhU_oekQF5Ox9FRYTMmvsxncdZpRUCIZpB_H-wWTWr5K0N6adtOF3jdC4aeaztd2YZpPP0Z74HgeBjsxWP7-JDutvbzHTL3OoOLOrhK1VVRF2pKYhleg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-11 20:27:58,780:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-11 20:27:58,782:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:27:55 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042400737 Replay-Nonce: zgT1AlV-cEvxg2jU0_ELKOp0h9OrVGeUeSL4_rLzFIaX7V7wILg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:10Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183108237" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042400737" } 2024-07-11 20:27:58,782:DEBUG:acme.client:Storing nonce: zgT1AlV-cEvxg2jU0_ELKOp0h9OrVGeUeSL4_rLzFIaX7V7wILg 2024-07-11 20:27:58,783:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:27:58,791:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183108237: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1jRXZ4ZzJqVTBfRUxLT3AwaDlPclZHZVVlU0w0X3JMekZJYVg3Vjd3SUxnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMxMDgyMzcifQ", "signature": "vSd6cldPFqOkFYG2zu-lRG6uH37GIXnddki9CsAk8uG9BDY_GUyIrSGvK-v6XwQVlU93YN-4lf1-EXN95mSk76MQ8kNxb2k7ODLqgElr4ufiMZOnJd8g3TNgMTx-NVTvP1U1jR9lIq03_onIvuPk8WI4ZqhdomKiIyQWt6rYwOaPPIgGq9hJdJ_mZ99j2DCIP3OHzSrREIrzzL-gYBd70yMg0YIZrOjIfdWLiKmqOc4Ps5Yrt17hQOEwJWsBFdlt4xwoO-GUNPMMsoLkb_cm4xaeRLN6Gi8QKfELbsY9XkbBZnbmPA9shkEvb2cYFgIsHB5cXd4oGFe45cgtuzr7hQ", "payload": "" } 2024-07-11 20:27:58,960:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183108237 HTTP/1.1" 200 801 2024-07-11 20:27:58,961:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:55 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-pGnorpX6vjnIFNzV8QboAOUoXv-H-OKb5Elltv1XixM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:10Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/2jPgJg", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/MtdTdg", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/1H2g1Q", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" } ] } 2024-07-11 20:27:58,962:DEBUG:acme.client:Storing nonce: zgT1AlV-pGnorpX6vjnIFNzV8QboAOUoXv-H-OKb5Elltv1XixM 2024-07-11 20:27:58,963:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:27:58,964:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-11 20:27:58,965:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:27:58,965:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:27:58,967:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:27:58,967:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:27:58,968:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:27:58,968:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:27:58,969:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:27:59,022:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:27:59,260:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:27:59,261:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 20:27:59,262:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 20:27:59,267:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-11 20:27:59,267:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:27:59,268:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:27:59,273:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:27:59,273:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:27:59,273:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:27:59,278:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:27:59,279:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:27:59,281:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:27:59,732:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:27:59,733:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:27:56 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "nafEZShJSmc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:27:59,734:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:28:04,733:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8363_key-certbot.pem 2024-07-11 20:28:09,464:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8361_csr-certbot.pem 2024-07-11 20:28:09,465:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:28:09,465:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:28:09,616:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:28:09,618:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqjVO75-5h_0LO8rovaPL9yDROpKs6wIaeIDFuM26Yclg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:28:09,618:DEBUG:acme.client:Storing nonce: EPg6kJgqjVO75-5h_0LO8rovaPL9yDROpKs6wIaeIDFuM26Yclg 2024-07-11 20:28:09,618:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:28:09,624:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FqVk83NS01aF8wTE84cm92YVBMOXlEUk9wS3M2d0lhZUlERnVNMjZZY2xnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DHuxSlAdRw6SvwbO8I-kGBnqobFOyBTm20dwxywd-ykdsdyyGaxYmadrUoj55uKZjdFYkN12f_Rs9SBklIplAPHeNkQXnUO7yu9MOyHAoup-vxe0iDlFzVQrx9vQ389Q-tKRuvnky3x8EZQ7bE1o090XQ6g2sJ-hoGd-ZopSDvPD3zSkEpTjI-MiWfzCsmHCOk8yJYPyaNdJOrT-xOrYIkr2DFCElnznFTbW3LyNtC1zgUX_GhjZqfHW_eSfY0bDnCiz2AHgHAB7LtEmop8nOEH1adKgQIsqwuW-4PvlQEIx09GoaCwGyXpybK9MqvAcYxQDSzUZpY1JdSnK-pjtXQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-11 20:28:09,790:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-11 20:28:09,791:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:28:06 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042441707 Replay-Nonce: oPjXeLW6nOkdteyjqN3NXrDHVQijTczIvx37BhrEOyd2gaZeMyA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:21Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183170507" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042441707" } 2024-07-11 20:28:09,792:DEBUG:acme.client:Storing nonce: oPjXeLW6nOkdteyjqN3NXrDHVQijTczIvx37BhrEOyd2gaZeMyA 2024-07-11 20:28:09,793:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:28:09,802:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183170507: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZuT2tkdGV5anFOM05YckRIVlFpalRjekl2eDM3QmhyRU95ZDJnYVplTXlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMxNzA1MDcifQ", "signature": "NxIg-y1KC4elytOwPmPaVWR7EeY77lYyrf_V745rCZkWLmGUPoYVQbECWzaKtl4YKwLIMLlnvq7y9SlWbyHAFQdoBGjcMLp1-Y1V717g7L6gdnMXw7U9DWKVmanXA_Zk8mUhXkCQOPayAUuW9NSzuC1jOV-Ff8uhgdJSJ-vbLz1iCUsk51brVRJV-g1SJ-G3bje9FfMTUU54tYniAnxNY65PlOOg1Dcf8r16PvqiSN-p_c-2W6Yq6Cq9vwO-dwcLmw-dE3oI04yAgH37qdbwByffzTORRjEV-O4aOPESmyOQdOeUX4HKZzSYsFpPrQNfL-nVR3Fd4HhVCgwIdpmOOw", "payload": "" } 2024-07-11 20:28:09,972:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183170507 HTTP/1.1" 200 805 2024-07-11 20:28:09,972:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:06 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW68FDQI9ruNjATWBN_BBngyNnEQeORJ_jVTNd6XdZ6Q0A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/LCB2Ww", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/I9mxAw", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/UAlFYQ", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" } ] } 2024-07-11 20:28:09,973:DEBUG:acme.client:Storing nonce: oPjXeLW68FDQI9ruNjATWBN_BBngyNnEQeORJ_jVTNd6XdZ6Q0A 2024-07-11 20:28:09,973:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:28:09,973:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-11 20:28:09,973:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:28:09,974:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:28:09,975:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:28:09,975:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:28:09,975:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:28:09,975:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:28:09,977:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:28:10,025:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:28:10,251:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:28:10,252:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-11 20:28:10,253:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-11 20:28:10,257:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-11 20:28:10,257:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:28:10,258:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:28:10,265:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:28:10,266:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:28:10,266:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:28:10,270:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:28:10,271:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:28:10,273:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:28:10,714:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:28:10,715:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:07 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "F8vstbGxc6M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:28:10,716:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:28:15,903:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8364_key-certbot.pem 2024-07-11 20:28:20,637:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8362_csr-certbot.pem 2024-07-11 20:28:20,637:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:28:20,637:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:28:20,782:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:28:20,783:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqbX9AthlzxDnCdQBxniopdpZGlVNncv4XmDmJ-dDfhEU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:28:20,784:DEBUG:acme.client:Storing nonce: EPg6kJgqbX9AthlzxDnCdQBxniopdpZGlVNncv4XmDmJ-dDfhEU 2024-07-11 20:28:20,784:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:28:20,795:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FiWDlBdGhsenhEbkNkUUJ4bmlvcGRwWkdsVk5uY3Y0WG1EbUotZERmaEVVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ufUdHMQMfsnc1p3sOAWH-PJJJBGZQDCAPaFR657av5B2SQykIkXGBNnxLGePHs7sFJ78LiQ50GCNvpgnAquuWXbCFERPrDqhNyYtK0LFl6Bj27Ob2ec38FRIwSbCtHTDBD1TyJtlv6lyd8IuuUtHeLraKn1NvfyUzBmkGS45OJZE9PP4lpxnPi4_DHLhDeV5IPI8YDoI5rb62iKkENW3OrJZ2l-rZGQeAco7V3P-zadcCNIqfUDpDmY9kq-41okYzNW_xfViZiVnzNGQ5a5U2_-Sh4wUNx1f1J1YXDOiyWd1GUEAnKuz-aSkckt_767ziG8aUZdamtHji8qVflQx5g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-11 20:28:20,980:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-11 20:28:20,982:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:28:17 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042480887 Replay-Nonce: oPjXeLW6Yz54NfbegvDmud5w7fpodxUjwTpLjLf3aLAjfaPS57M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:32Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183227457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042480887" } 2024-07-11 20:28:20,982:DEBUG:acme.client:Storing nonce: oPjXeLW6Yz54NfbegvDmud5w7fpodxUjwTpLjLf3aLAjfaPS57M 2024-07-11 20:28:20,983:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:28:20,991:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183227457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZZejU0TmZiZWd2RG11ZDV3N2Zwb2R4VWp3VHBMakxmM2FMQWpmYVBTNTdNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMyMjc0NTcifQ", "signature": "HszEzSGLGD8AZAuWX8cRvZJL9-Vl4AMgPRbIfV0CM6UAsRBWTEmVSZfQQ-uzf4ou-DB3jAAGI0Ok78Rs_2qatib4lJr5hjEhe8ebwtJ_eTKjUv7fSkI3xScjU5Jb1mkKuM6M90mRphDc7E00lKVU286Gue6kcABfWrIJ0GCmRYg3MLVLH455Hf_Gwhy6Sf6vE3AKK2xei1UV_H_nSxf3mC1gxal6apCipOiM1YycU-BfInHYNAsWI4S34jvkr9Ib9Ue0FsJdsM44EZmKgEGSu8X3aqEd4McH4sTy3rEeeSppbrVn__S1s9DjsQjxU84p7WoBUFGBtfA1uTaaL9ZkdQ", "payload": "" } 2024-07-11 20:28:21,141:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183227457 HTTP/1.1" 200 809 2024-07-11 20:28:21,142:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:17 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6wv5L8gEA05ELBLQzbeB_U_HLxCkLHAFmiPGK_2UksKI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/Us5Z1g", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/XssHxw", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/UVYPXQ", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" } ] } 2024-07-11 20:28:21,143:DEBUG:acme.client:Storing nonce: oPjXeLW6wv5L8gEA05ELBLQzbeB_U_HLxCkLHAFmiPGK_2UksKI 2024-07-11 20:28:21,144:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:28:21,145:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-11 20:28:21,146:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:28:21,146:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:28:21,148:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:28:21,148:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:28:21,148:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:28:21,149:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:28:21,151:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:28:21,208:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:28:21,423:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:28:21,424:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-11 20:28:21,425:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-11 20:28:21,429:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-08-06 23:03:56 UTC. 2024-07-11 20:28:21,429:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:28:21,429:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:28:21,434:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:28:21,434:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:28:21,435:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:28:21,453:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:28:21,454:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:28:21,456:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:28:21,924:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:28:21,926:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:18 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6b9f3XY70-8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:28:21,927:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:28:27,112:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8365_key-certbot.pem 2024-07-11 20:28:31,803:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8363_csr-certbot.pem 2024-07-11 20:28:31,803:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:28:31,804:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:28:31,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:28:31,962:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-WVoDAcKhKlF51cgr6vMvkvBi9tuilzoIXOxaR_cS3fU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:28:31,962:DEBUG:acme.client:Storing nonce: zgT1AlV-WVoDAcKhKlF51cgr6vMvkvBi9tuilzoIXOxaR_cS3fU 2024-07-11 20:28:31,963:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:28:31,971:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1XVm9EQWNLaEtsRjUxY2dyNnZNdmt2Qmk5dHVpbHpvSVhPeGFSX2NTM2ZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MN8cVhmIp7v5eAXu_3VGB3DARID5IAiA2Og7PFpfL-a9binkQeCa7anbYtEkG0VBKl7Pnl9v9EY0m6BFvM16IkV7GfG1GcnkAm1dCsAkobmT77qgMdtpHdp3FgO3hpaIlVofrZypRh0oMdvQ0nX6GkXMt991A0J3np43XOmuVpBuqWY-_TiqmLOUFuiAwtYwaKeJIuoxoSGLK7-GQDb2VE3TAXsdtXRy1djasEpAev_RmJDX4CBylyuoNYnXlriRbWfAsy2dbA5zHNONiJiTRvLRAksmKXzFiwmKjZ6nNaTjNyWAN_fUtHXmX4O9p7cF4VeNry2rWM_3AsOGA0Pt2w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-11 20:28:32,167:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-11 20:28:32,169:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:28:28 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/285341919627 Replay-Nonce: eFSVlf8UDeJEuKK5irvjSa6AglaeE21Ch6oiGk0aLv1kTDr8XWU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-15T04:13:07Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/285341919627" } 2024-07-11 20:28:32,169:DEBUG:acme.client:Storing nonce: eFSVlf8UDeJEuKK5irvjSa6AglaeE21Ch6oiGk0aLv1kTDr8XWU 2024-07-11 20:28:32,170:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:28:32,180:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVEZUpFdUtLNWlydmpTYTZBZ2xhZUUyMUNoNm9pR2swYUx2MWtURHI4WFdVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzQxNTAyMDI0NDcifQ", "signature": "beriM1hnVAXU_2ANRpbLkFduTRJhdBrRNW2TkrheQg_h8HCceP5cdGr4RNJaaV6ENdFcb_KSEdU1gJ9bVZ75xSquR3bk1hStEDGB3wFNCAZiWYAZVoX9wJVSQFtcNV8rilidDsdX-5Zj-i9XaB_Zr64zRjPdCt80_Ue1uAtbZF4TxymJmR5TgEdBhrA75S3yUXJ6pQEuViUe85hczGVp0-BYbMGYSKDrTxqpCY0iPYC06veSw9RWDDXif3ZS2iG40GnHgi_qbKi-NSPBjKrR4JXoIlGO83f8IunQ12rz6Cfaq-vnvAwTlm87rgJI9yq8Xp9yw0RSn8xzRKHe7VxIkg", "payload": "" } 2024-07-11 20:28:32,341:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/374150202447 HTTP/1.1" 200 807 2024-07-11 20:28:32,343:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:29 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UvVqjUtrSSDnPDFt5wM_TScLHfg31UvT9oeLNn68sMAc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-15T04:13:07Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/NY8rUA", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/R0qBhg", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/2vSv0A", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" } ] } 2024-07-11 20:28:32,343:DEBUG:acme.client:Storing nonce: eFSVlf8UvVqjUtrSSDnPDFt5wM_TScLHfg31UvT9oeLNn68sMAc 2024-07-11 20:28:32,344:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:28:32,344:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-07-11 20:28:32,345:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:28:32,345:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:28:32,346:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:28:32,346:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:28:32,346:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:28:32,347:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:28:32,348:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:28:32,386:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:28:32,628:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:28:32,629:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 20:28:32,630:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 20:28:32,634:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-11 20:28:32,634:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:28:32,635:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:28:32,640:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:28:32,640:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:28:32,640:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:28:32,644:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:28:32,645:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:28:32,647:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:28:33,132:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:28:33,133:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "mOtgADNYG_M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:28:33,133:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:28:38,176:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8366_key-certbot.pem 2024-07-11 20:28:42,928:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8364_csr-certbot.pem 2024-07-11 20:28:42,928:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:28:42,929:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:28:43,091:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:28:43,092:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UPUgPLlq5nHVlRyCe6IdGSP6ltopC5VtuoSP9jHrOQ1E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:28:43,093:DEBUG:acme.client:Storing nonce: eFSVlf8UPUgPLlq5nHVlRyCe6IdGSP6ltopC5VtuoSP9jHrOQ1E 2024-07-11 20:28:43,093:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:28:43,100:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVQVWdQTGxxNW5IVmxSeUNlNklkR1NQNmx0b3BDNVZ0dW9TUDlqSHJPUTFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "i1WhIiqYZC-eYsgI5vSlrvC2DrPTqM__2z2GxmeclYumFDJvbiCgqhhnuKAXmNylAzpjdybUUZiw6h-RYfWR8ACIL281hIKPGBSAblV3ZIXy7WZC84wKDW8Z7ZcRXIV1KjrBzFC6IDfTg4uDpt-g2WeMnTxZD-eJkmhF5QhdVq7Yy0N7rRS-UJI6TD1w00LIlGVq7qM_6tYJnPwnDje22tecLQ8PE5iHaf3BYOQKE0oYBcYdzQQavBYgl2Xm84huCLdW73Gwax-_O47xNVgOJOimmGFvhU-6FLwFLkgwD03AD97yAgPCxskvRAD_l5hx9iBMn91fgBvxgTZeCXUV7g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-11 20:28:43,355:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-11 20:28:43,357:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:28:40 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042554147 Replay-Nonce: zgT1AlV-PLu4Bkb64nAeX-jtGCWSvkpr3Z7QmS629LjWUkSi3GE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:54Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183336527" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042554147" } 2024-07-11 20:28:43,357:DEBUG:acme.client:Storing nonce: zgT1AlV-PLu4Bkb64nAeX-jtGCWSvkpr3Z7QmS629LjWUkSi3GE 2024-07-11 20:28:43,358:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:28:43,369:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183336527: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1QTHU0QmtiNjRuQWVYLWp0R0NXU3ZrcHIzWjdRbVM2MjlMaldVa1NpM0dFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMzMzY1MjcifQ", "signature": "uaqg9M-IlXTlJiX7beS5u2RGEjbiOo96PYUoFWMNE6iwrBf1VRAGVjX1MHaTjc8o1HaYdkVLGDUvIZfiHgQwi7hVY10QnxctZBnzvkJ3Y95uw4nBROUzv_rXFt6KGVLlPMC2tLI6odLBMtxNqL5MIpIl5kNsnHfzRcRyEAaT1sHTV1TZA3Yz-pkL_c1V1Ojx4n82lTld1sIVnqST-H3Dkl-husIv7ST03E15LdEq5QYG_ZmK2PQpmphTVfB1cxKtln_8kek4nrfMW3fxP3Z7XsCV1ih-ilGZvTvHVFQIrHLjqTBxOx0LQzRwIj8s-9fbhBqehZ64DMfIudliWF3NOA", "payload": "" } 2024-07-11 20:28:43,535:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183336527 HTTP/1.1" 200 806 2024-07-11 20:28:43,537:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:40 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8U-uRLa9lFtkg-m2mZyrOR67FFXcafo8eCK5ukqUOiuG4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:54Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/LtvPaA", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/uTcC3A", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/tbjSgg", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" } ] } 2024-07-11 20:28:43,537:DEBUG:acme.client:Storing nonce: eFSVlf8U-uRLa9lFtkg-m2mZyrOR67FFXcafo8eCK5ukqUOiuG4 2024-07-11 20:28:43,538:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:28:43,539:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-11 20:28:43,540:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:28:43,541:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:28:43,542:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:28:43,543:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:28:43,543:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:28:43,544:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:28:43,548:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:28:43,586:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-11 20:28:43,586:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:28:43,587:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-11 20:28:43,594:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-11 20:28:43,596:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-11 20:28:43,596:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-11 20:28:43,596:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-11 20:28:43,597:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-11 20:28:43,598:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-11 20:28:43,639:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:28:43,823:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:28:43,826:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 20:28:43,828:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 20:28:43,836:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-11 20:28:43,836:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:28:43,836:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:28:43,841:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:28:43,842:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:28:43,842:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:28:43,863:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:28:43,864:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:28:43,866:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:28:44,346:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:28:44,347:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4r1e-iVzzf8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:28:44,349:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:28:49,598:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8367_key-certbot.pem 2024-07-11 20:28:54,233:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8365_csr-certbot.pem 2024-07-11 20:28:54,233:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:28:54,234:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:28:54,390:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:28:54,391:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UtMORNHr2kVxv3L_PIRQvuVDcx_Fiw09oB6KpK_bKsls X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:28:54,391:DEBUG:acme.client:Storing nonce: eFSVlf8UtMORNHr2kVxv3L_PIRQvuVDcx_Fiw09oB6KpK_bKsls 2024-07-11 20:28:54,392:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:28:54,399:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFV0TU9STkhyMmtWeHYzTF9QSVJRdnVWRGN4X0ZpdzA5b0I2S3BLX2JLc2xzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "TXhG9EFGyW70phqlWBmw-nckFdSWeYIIDVG21SYANOKq9sgdJuyFJh9WkcBQOp5_-ESRiVDQZ9O31Lg-mB2CFnWT4MV7im2M1jjgimdP807FUBVCR8v2hxttvb50Qa_BWse3B89UkCWFmyahGmuUraXLhH7rdPnVJUI3VlcKeLE885NakptL8BPYWD_tA7rt0P_QOiauIPKOGJ6yTjRVjZSGqw5okxV32YIgzN4zPfMAd5_Fk_q3CHVPdvGYKDF1SgtSrViaNy0B7CqzwRqoFEXijDC1JqZ64nkwd7B7Nsj0hnH7tue5fXwQfnFe2_8Ljr8__m7jQ10LL409P4BFJg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-11 20:28:54,592:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-11 20:28:54,594:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:28:51 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042595287 Replay-Nonce: eFSVlf8UI-99BEcs2u10XkxcWEk4dokM4_fbYgbCUNk6w38MCiI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:05Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183394907" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042595287" } 2024-07-11 20:28:54,594:DEBUG:acme.client:Storing nonce: eFSVlf8UI-99BEcs2u10XkxcWEk4dokM4_fbYgbCUNk6w38MCiI 2024-07-11 20:28:54,595:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:28:54,604:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183394907: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVJLTk5QkVjczJ1MTBYa3hjV0VrNGRva000X2ZiWWdiQ1VOazZ3MzhNQ2lJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMzOTQ5MDcifQ", "signature": "E7ljj-a9J_we4kEHGbsQdaR5GtcJ5Z2NDuvRh4g4fig4rAd5_bfqMMN0EwKXhl_7MnYTdDHU1UWm32j7c21eg2lbDIV-GzZeP-h7LjYW1xXn76QruKuNvvGX6pbOz3Ysdi_HMj-ysy-7d2EMI2I4GthKTk9JstEw3aJxYM4DgepggIQAncdvOOp6jgHn4TLNUr71LZf681Ui4lmPbNHTO0vx2d_nSwEtOdtULu1B5azYgCxWfpkmc3s_rJWQ4rJ17lCiEU7HiHs_WKG7JFRhR_eUZMudmzKaOnLw1yffwzUNsQab2O_cnhJATVeJdttEaEIsL9324jmrIjwMBhiFkQ", "payload": "" } 2024-07-11 20:28:54,765:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183394907 HTTP/1.1" 200 811 2024-07-11 20:28:54,767:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:51 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-VU_Kx0GfpzrwoNNPPSMg_iLwKHQPzWE-K-yGt8pr_zw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:05Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/78vQQw", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/p4w28w", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/j5xMwg", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" } ] } 2024-07-11 20:28:54,767:DEBUG:acme.client:Storing nonce: zgT1AlV-VU_Kx0GfpzrwoNNPPSMg_iLwKHQPzWE-K-yGt8pr_zw 2024-07-11 20:28:54,768:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:28:54,769:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-11 20:28:54,769:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:28:54,770:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:28:54,771:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:28:54,772:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:28:54,772:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:28:54,772:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:28:54,774:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:28:54,833:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:28:55,033:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:28:55,036:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 20:28:55,037:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 20:28:55,042:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-11 20:28:55,042:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:28:55,042:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:28:55,047:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:28:55,048:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:28:55,048:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:28:55,059:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:28:55,060:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:28:55,062:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:28:55,534:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:28:55,536:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:28:52 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "YMcAQLn-9PM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:28:55,537:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:29:00,418:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8368_key-certbot.pem 2024-07-11 20:29:05,039:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8366_csr-certbot.pem 2024-07-11 20:29:05,040:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:29:05,040:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:29:05,196:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:29:05,197:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-gIKvjIaxPdBc23zhxv7Z6-irFx2pB8FIM0rdajR2Otc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:29:05,197:DEBUG:acme.client:Storing nonce: zgT1AlV-gIKvjIaxPdBc23zhxv7Z6-irFx2pB8FIM0rdajR2Otc 2024-07-11 20:29:05,198:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:29:05,203:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1nSUt2aklheFBkQmMyM3poeHY3WjYtaXJGeDJwQjhGSU0wcmRhalIyT3RjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EIlyf9XLzdO6D_bLsLKwrGaAR70ibSpCPbnFBqlzB5FuWm4Mn6e0G-wNEZSJRBH9Pu3LExlmhjSpCwy4Fxutj_lSgUXXBSmg3QDLe_s8Mu81hphpK-Ynfc7pjr7dnTVWMHkZaT4Zm9JUmznDE-JSM31McDWyqtu9UkLSW3d7tl2RFp8sVqPcmE1nRKh75T5kyqLtDjgwDEYmOn7AThgQB2XlWRQiJ8kLa_cqjd8ykDeExzn-TieLcQ4Vtk5WxBNi5ImeqRpqjOcP3SCDo-0M-Tdh1t0cAoWpxNaCPMaMzeY3fOaK4_ld-uAam0qQ8SMTzLjc3tSSWPv6wtzFd97feA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-11 20:29:05,382:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-11 20:29:05,384:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:29:02 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042636517 Replay-Nonce: zgT1AlV-KMVJfpaoN7GGZLRtToJXqtmW5iTKQF_msXLhFjybzt0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183457817" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042636517" } 2024-07-11 20:29:05,384:DEBUG:acme.client:Storing nonce: zgT1AlV-KMVJfpaoN7GGZLRtToJXqtmW5iTKQF_msXLhFjybzt0 2024-07-11 20:29:05,385:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:29:05,392:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183457817: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1LTVZKZnBhb043R0daTFJ0VG9KWHF0bVc1aVRLUUZfbXNYTGhGanlienQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM0NTc4MTcifQ", "signature": "at2zStCtbttBvdgBhoAmR6Dc-6JcyaUadcS30yWS7OFfvLbKsauCw9zav9sm6oGN6gwvJcR88FfLDri67zLO9Afcl7E1vfw9nrQnjJm_JegohvryaAD3IDmT-ToOIFSqINbBbK-eF_4VJAs-E7y7KtmRlt3SDKztDaQjajg8nGmnMCep6XNW6EhE3MMPvwTYe2NfzoF-XcoDQki0bAvM7JHmzQO229fldEzhvGiijNXZIxXciB2hSC31h8MKI3yp7SwLM9q0QhvSNLcEMWW8OI8S890gc6thzQl2eRoYk3KpKgmv8NyoXWQQelv3J32yVLd2qsb5xQoIMdnRuihk5Q", "payload": "" } 2024-07-11 20:29:05,553:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183457817 HTTP/1.1" 200 810 2024-07-11 20:29:05,554:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:02 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-2n07DWOM-Gu1hlXf-Ff_q3FQQcSp7oVNQcqPruSJDpc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/RejdSQ", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/r4Hc4w", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/l3Nghg", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" } ] } 2024-07-11 20:29:05,555:DEBUG:acme.client:Storing nonce: zgT1AlV-2n07DWOM-Gu1hlXf-Ff_q3FQQcSp7oVNQcqPruSJDpc 2024-07-11 20:29:05,556:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:29:05,556:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-11 20:29:05,557:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:29:05,558:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:29:05,559:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:29:05,560:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:29:05,560:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:29:05,560:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:29:05,561:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:29:05,613:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:29:06,023:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:29:06,024:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-11 20:29:06,025:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-11 20:29:06,029:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-11 20:29:06,029:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:29:06,029:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:29:06,034:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:29:06,034:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:29:06,034:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:29:06,049:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:29:06,050:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:29:06,052:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:29:06,521:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:29:06,523:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:03 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "sgKoZuWtexw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-11 20:29:06,524:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:29:11,222:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8369_key-certbot.pem 2024-07-11 20:29:15,753:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8367_csr-certbot.pem 2024-07-11 20:29:15,754:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:29:15,754:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:29:15,911:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:29:15,912:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8Ulg_CEfVsHJHGfCWN_1FmotjXkBUid6WumKQH15p1gyA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:29:15,912:DEBUG:acme.client:Storing nonce: eFSVlf8Ulg_CEfVsHJHGfCWN_1FmotjXkBUid6WumKQH15p1gyA 2024-07-11 20:29:15,913:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:29:15,921:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVsZ19DRWZWc0hKSEdmQ1dOXzFGbW90alhrQlVpZDZXdW1LUUgxNXAxZ3lBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PKXYEBqZIbAXSjqtmDhICfVPdrUccQMYz5ytgY0Mt_9whIkzP9eepnZauc9u6PdlhYiAhyH0kqdXgbWPneXQPjxRuI7Cqv58vK3pLZ6B1EkvionqMPQBAd4pYMTB7JX3K6DnJv19dCuku1oe1kzLJZDtThJflAABavphryJtEN4uon83B1S8VbMCt7YPsa9ACsVQ0iYlUQ1pMRLmI1IVmZdwxC12DfcspfqO2dxTayN8kmCxFojGd22aKiJXNwI5UD2bsSCyEkhx5SHq5D7o3iVAarDoaRx2iUlrKTIvHYqOO8Gxv3nzr7fd93EHkGm0CD0Jt-l110qgedSdumg2qg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-11 20:29:16,122:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-11 20:29:16,124:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:29:12 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042672187 Replay-Nonce: zgT1AlV-Y9bapHKAiJEWE0E-Na1G3R2CKA2XnRne9dsi1xB9wUM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:27Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183510157" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042672187" } 2024-07-11 20:29:16,124:DEBUG:acme.client:Storing nonce: zgT1AlV-Y9bapHKAiJEWE0E-Na1G3R2CKA2XnRne9dsi1xB9wUM 2024-07-11 20:29:16,125:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:29:16,132:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183510157: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1ZOWJhcEhLQWlKRVdFMEUtTmExRzNSMkNLQTJYblJuZTlkc2kxeEI5d1VNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM1MTAxNTcifQ", "signature": "kQjMGWprwaty3k1h-jhf2O4c84_dhul3fLGdXYT7Obad2UsMn7uA_9MX7E46QcF7DnhPtzfaJahBT-IR_33Wle08wYLpt2HLwZ-Jbi39wtx8LBD4MULEdIMcGzQWnpQqwywuPXKpzPweSHK7BEaXsFJMVuaF_tYhSRXG-610OyH5vspmGrkdzHiACN9LAK_JFVpV1zXwUoROsQEBXbMAzM-Upx958A1MmtR37qnaPMqbwHJMyP-JrPlH-VZ9HWUmo94L-a1slFH77_aScO92NkuGespv0Dj6eGxEx2FS1IH9YpncijutK6d1Rho3wcdOzs8z5SEudm8Yq8xjlSMniA", "payload": "" } 2024-07-11 20:29:16,297:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183510157 HTTP/1.1" 200 809 2024-07-11 20:29:16,299:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:13 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UBRkIs2WCqR0R-PpcflmEXdN1B521mjw2CdNMLNnBkkw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:27Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/9E6R1w", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/8v5Buw", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/2WSNJg", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" } ] } 2024-07-11 20:29:16,299:DEBUG:acme.client:Storing nonce: eFSVlf8UBRkIs2WCqR0R-PpcflmEXdN1B521mjw2CdNMLNnBkkw 2024-07-11 20:29:16,300:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:29:16,301:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-11 20:29:16,302:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:29:16,302:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:29:16,304:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:29:16,304:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:29:16,305:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:29:16,305:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:29:16,308:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:29:16,357:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:29:16,561:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:29:16,564:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-11 20:29:16,564:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-11 20:29:16,568:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-11 20:29:16,568:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:29:16,569:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:29:16,574:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:29:16,574:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:29:16,574:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:29:16,578:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:29:16,579:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:29:16,581:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:29:17,025:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:29:17,026:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:13 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HG8ngF2ijDk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:29:17,026:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:29:21,962:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8370_key-certbot.pem 2024-07-11 20:29:26,620:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8368_csr-certbot.pem 2024-07-11 20:29:26,621:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:29:26,621:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:29:26,770:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:29:26,772:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqialaHbiAXU1S7zxxBroplNVcovbdjeCzEzmGd3TAXgc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:29:26,772:DEBUG:acme.client:Storing nonce: EPg6kJgqialaHbiAXU1S7zxxBroplNVcovbdjeCzEzmGd3TAXgc 2024-07-11 20:29:26,773:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:29:26,782:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FpYWxhSGJpQVhVMVM3enh4QnJvcGxOVmNvdmJkamVDekV6bUdkM1RBWGdjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mdy1aDBV-5V0k0LoJII0OAUmTqaxWcZgG-r4wzTP-TqJvTI9qnSdjya_SKGqTWpkA7_NGo7tqqqVTpRB-Oy_ijScu0epA2Zd3z8XkXx8dLD3FXDPRMb5fV1eX0qEncgKHRlMnp72Y2DsEbNe6CU4ftQzKjHujQxgFHNsQVbMRbK9yFa6LLrV7MU7PVz15tNGE4l88_K2Cqq4V1fQHgFNwHPF9WoJ6siS6dVyXsaS8lO4drGkwrdr-3KmGyA2GPWhOTqQB80yn-6KZhWtQp-Z4TRAQGAYfF8VhMmWPzMUwv3NSUaJ4w0Cin-aPxiDwdoXJn24WA4sPb6l-5iZdPorBA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-11 20:29:26,945:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-11 20:29:26,946:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:29:23 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042704307 Replay-Nonce: EPg6kJgqoo9j8xAP0xUKrM_yczFpGgr8IQeaZBytGjupOFCBT1k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:37Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183559397" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042704307" } 2024-07-11 20:29:26,946:DEBUG:acme.client:Storing nonce: EPg6kJgqoo9j8xAP0xUKrM_yczFpGgr8IQeaZBytGjupOFCBT1k 2024-07-11 20:29:26,946:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:29:26,952:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183559397: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FvbzlqOHhBUDB4VUtyTV95Y3pGcEdncjhJUWVhWkJ5dEdqdXBPRkNCVDFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM1NTkzOTcifQ", "signature": "XCcrT6APj12FO61f543XhWgNsGuv9dcE-AkT29iUoNLshIQDcbyULUQbnApE_EnwZ4RkD1QghFiJ_xPDQygbNoKigeTQvef7SNFlAjwLmADTtQ9oeumSbOCnrUX7boAgbTS6SMaUOXtQO4Zxk7gTQvEKdg53Z4fitGbD0_vF_RHVWs_9lwXsc1yHn72HdQqDWZMW9BWhsFxeEZ-xNN9TfTt_jDYZySIh6pnf6focJ9o5OIsG2lqcETN3go0_izbvrGXnPUf7F-MUBy3-eX5DxKyFBvXeuXwgX6sV6rYieDBOORbGhhc1HIzt18U2i4B36QWsBKDw7QM4tlx3JXcHsQ", "payload": "" } 2024-07-11 20:29:27,105:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183559397 HTTP/1.1" 200 805 2024-07-11 20:29:27,106:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:23 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgq7QQFMwcobxX4H7_Br9v4092TnreHW1H5-teEk9-4ej4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:37Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/8Y1D2A", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/nFVVvA", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/ITyESg", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" } ] } 2024-07-11 20:29:27,106:DEBUG:acme.client:Storing nonce: EPg6kJgq7QQFMwcobxX4H7_Br9v4092TnreHW1H5-teEk9-4ej4 2024-07-11 20:29:27,107:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:29:27,107:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-11 20:29:27,108:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:29:27,109:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:29:27,109:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:29:27,110:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:29:27,110:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:29:27,110:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:29:27,111:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:29:27,150:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:29:27,719:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:29:27,721:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 20:29:27,723:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 20:29:27,740:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-11 20:29:27,740:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:29:27,741:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:29:27,746:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:29:27,746:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:29:27,746:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:29:27,751:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:29:27,752:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:29:27,754:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:29:28,204:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:29:28,204:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:25 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6_kTH1CuYto": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:29:28,205:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:29:33,021:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8371_key-certbot.pem 2024-07-11 20:29:37,744:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8369_csr-certbot.pem 2024-07-11 20:29:37,745:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:29:37,745:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:29:37,895:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:29:37,896:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6Qn_kAEKGHmOF5Q9znUqF2fGK_7tkz4ZbQ2WENMus2kA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:29:37,897:DEBUG:acme.client:Storing nonce: oPjXeLW6Qn_kAEKGHmOF5Q9znUqF2fGK_7tkz4ZbQ2WENMus2kA 2024-07-11 20:29:37,897:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:29:37,909:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZRbl9rQUVLR0htT0Y1UTl6blVxRjJmR0tfN3RrejRaYlEyV0VOTXVzMmtBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "lBYJ6tJaz_MNsDT0Z94vLOqpm5YCc-thWjyzI7DhpbsZK1Q3_Zt9v3wqHI10lGWzq_ThPeZkxM_xzUOfRY1mcU5k4uymz3CoS_kcYMXx9LKttRxMMSZz3le58vN45JGpXvSs9Xy81kFP7vF59Oeh-PK0LVseP0j3G4NB0T9a8NyyeS2zOwXWdv4BhfnVGLMPhPM-P8PIfXaqBhpH7w0mAZJT9zZj8nfYbRUvXLG5hThKf0lchcjHszNZuekFmgJUzMj_p7V4-MGAIQcdhwvQ6chQ5zOCB51uo5ZCZ6rmx2WZeHh4lzHVyrHxgGP5Q5flL8ryRrcME-n5LBazXMCmvg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-11 20:29:38,095:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-11 20:29:38,096:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:29:34 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042741137 Replay-Nonce: oPjXeLW6vhRC6imiCLwusb-BXKXLYtUy6tj_zFYxP7TJRLw-yHo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:49Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183613287" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042741137" } 2024-07-11 20:29:38,097:DEBUG:acme.client:Storing nonce: oPjXeLW6vhRC6imiCLwusb-BXKXLYtUy6tj_zFYxP7TJRLw-yHo 2024-07-11 20:29:38,098:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:29:38,106:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183613287: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZ2aFJDNmltaUNMd3VzYi1CWEtYTFl0VXk2dGpfekZZeFA3VEpSTHcteUhvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM2MTMyODcifQ", "signature": "culpnFlAHlpyNEZL84JeM3JHua-AEU_rL9XDhcNclR_oCZ788Aafz12YuQguf-RpJ0kBxO3Cx-OZcCI81_tE06S1nf1g3O2T3R2qz1mtqzdacUL3KdxWlpkfCadPzNE0QE95S7N-ZeNAPCnm23g6KhuYDoUIfor-uK-TWTKk4Z4ni9fNCHED_BGZjgdc-tHE2sSw7QgSZcTG2l6MY1fL97QhZN9N3-fOlYbkrVIm7tf-xEbPSGgUPh-SNiQhTkGr2dAwoABsvLtxdoIBmWC-uR7HqsfjnhIsiOVThY4xxcLwa1A9HCj5-FvYACTO-D4PoPp--5P6Xu16V6J5jrElQg", "payload": "" } 2024-07-11 20:29:38,274:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183613287 HTTP/1.1" 200 805 2024-07-11 20:29:38,275:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:35 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqjnfq3pNCejG39iiicMcSErArK7coqeYwU6MtwUtQccA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:49Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/Dj3vNw", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/EcZFOg", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/OjEpqw", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" } ] } 2024-07-11 20:29:38,275:DEBUG:acme.client:Storing nonce: EPg6kJgqjnfq3pNCejG39iiicMcSErArK7coqeYwU6MtwUtQccA 2024-07-11 20:29:38,276:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:29:38,276:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-11 20:29:38,277:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:29:38,277:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:29:38,278:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:29:38,278:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:29:38,278:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:29:38,279:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:29:38,280:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:29:38,325:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 20:29:38,955:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 20:29:38,958:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-11 20:29:38,959:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-11 20:29:38,963:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-11 20:29:38,963:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 20:29:38,963:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 20:29:38,969:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 20:29:38,969:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 20:29:38,970:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 20:29:38,985:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 20:29:38,986:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 20:29:38,989:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 20:29:39,476:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 20:29:39,477:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:36 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ch7Dv4DBUkM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 20:29:39,478:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 20:29:44,276:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8372_key-certbot.pem 2024-07-11 20:29:49,006:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8370_csr-certbot.pem 2024-07-11 20:29:49,007:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 20:29:49,007:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 20:29:49,170:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 20:29:49,171:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UX0fjoQs7HUFAtBBthUzrbiIaGlGZsfcVWQMRRFiIbbI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 20:29:49,171:DEBUG:acme.client:Storing nonce: eFSVlf8UX0fjoQs7HUFAtBBthUzrbiIaGlGZsfcVWQMRRFiIbbI 2024-07-11 20:29:49,172:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 20:29:49,178:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVYMGZqb1FzN0hVRkF0QkJ0aFV6cmJpSWFHbEdac2ZjVldRTVJSRmlJYmJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Hcm8G3-4ya51QcJDSjFubyzEQpOTnIMD3CviUg79_1WXrftJFGMJOZfwVMfsuwey5wRYxE3n7zjg2w0P9OYkq3Wz6far8lbLwTh7I9z4RmyhYCR5yQWbkKncZD0fgNmo-YCEcYbI7iDWjsIySRG52YGspBAEno1wIBGxx8XXHlr5jKuiAz61E-eCn1DHEt-2zxuLNOY1ZOqv6IzNCl6jHxxo1rqjJ_lTxS_4FDLxqa42UpeisQrHDtnG9rywC-bHLNg-XD6G4asIBMFZtqOC5gMFusBGhpBCXmvEheZX4rdV7YWaIemScorlKLFABAMjABhm37iSZPN4bT2uZcFePg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-11 20:29:49,376:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-11 20:29:49,377:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 18:29:46 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042772467 Replay-Nonce: zgT1AlV-KaUAn3uVQ943pgEDU5ZALaUFwGKo9mQyk-ZIH7bfom8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:59Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183661077" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042772467" } 2024-07-11 20:29:49,377:DEBUG:acme.client:Storing nonce: zgT1AlV-KaUAn3uVQ943pgEDU5ZALaUFwGKo9mQyk-ZIH7bfom8 2024-07-11 20:29:49,378:DEBUG:acme.client:JWS payload: b'' 2024-07-11 20:29:49,383:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183661077: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1LYVVBbjN1VlE5NDNwZ0VEVTVaQUxhVUZ3R0tvOW1ReWstWklIN2Jmb204IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM2NjEwNzcifQ", "signature": "WPYLIHp1IfXJcX4JC0hEDY6XB-4gSWK3lYVXAl3f7WwgXmYmKyFNMXHvlWuohno9VUBkX0JjMwItJyTMtDZDWnLA97FuvQT60Nc6t_-gd6Vh75kJ-jFCN56dowvfC-RRUPsru9MwA9yNiTHPJTE0qVeytileHhPL-IU1Lx7hkvev-gRz6lcM_d0lnR-2shN_hZWJZi63gzFg6HQ_SEcM2RYskyP3R3c0SpLDq8rgm83qm1-2lLJCBVUAdjvQTrdiGEewtjbG2t4myY9W6019nfQmUBKEog_o4E5SKxRdRWgQwMTN6MHG-KvLp5n65-rQDsD40snjn2dH_LgNZ7cJDg", "payload": "" } 2024-07-11 20:29:49,555:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183661077 HTTP/1.1" 200 805 2024-07-11 20:29:49,556:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 18:29:46 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8U4h5bM8KSBYV3NaC_PvtIs3xkmyTfKLls-1O5oR0dZbU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/mMPmZA", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/oiTplA", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/6s0vLQ", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" } ] } 2024-07-11 20:29:49,556:DEBUG:acme.client:Storing nonce: eFSVlf8U4h5bM8KSBYV3NaC_PvtIs3xkmyTfKLls-1O5oR0dZbU 2024-07-11 20:29:49,556:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 20:29:49,557:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-11 20:29:49,558:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 20:29:49,558:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 20:29:49,559:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:29:49,559:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 20:29:49,559:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 20:29:49,559:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 20:29:49,560:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 20:29:49,561:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-11 20:29:49,561:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-11 20:29:49,572:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-07-11 20:29:49,573:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)