2024-07-11 02:14:03,471:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-11 02:14:03,471:DEBUG:certbot._internal.main:Arguments: [] 2024-07-11 02:14:03,471:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-11 02:14:04,298:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-11 02:14:04,299:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-11 02:14:04,338:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-07-11 02:14:04,380:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:14:04,583:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:14:04,603:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-11 02:14:04,609:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-11 02:14:04,618:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-11 02:14:04,618:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:14:04,619:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:14:04,624:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:14:04,625:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:14:04,625:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:14:04,631:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:14:04,632:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:14:04,634:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:14:05,131:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:14:05,132:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:02 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "hGFC4v2WM0M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 02:14:05,133:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:14:11,030:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8345_key-certbot.pem 2024-07-11 02:14:16,298:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8343_csr-certbot.pem 2024-07-11 02:14:16,299:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:14:16,299:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:14:16,460:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:14:16,460:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UKcfioGUtDWZWKysPF-ZrG-H7PK4pEMDkg5ggpZP8k74 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:14:16,461:DEBUG:acme.client:Storing nonce: eFSVlf8UKcfioGUtDWZWKysPF-ZrG-H7PK4pEMDkg5ggpZP8k74 2024-07-11 02:14:16,461:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:14:16,468:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVLY2Zpb0dVdERXWldLeXNQRi1ackctSDdQSzRwRU1Ea2c1Z2dwWlA4azc0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "c2TXn677T3hCimhteWsfkfC2SDuDlUhIyz2IGm5C6zECJ3dYY5pCs1Z_S8waNvxO7SQMhkjvjlC_quMKSJrGHRippDacxBMWFJIpZ30astlSR6IXlavW7Unhs8MZWOXk191u7Af5dAY3zgb0TGncmYj13UJvcdX5HUI-8H62KDM3rvP1QI66pHmpQnBs_J73rJ0AoRkhclGPs1wei_ojGR3aZ2lLD9OnfDGO1vck4sEmgp_1noRc5miZw3kJVC9V05MnkDQTqIMQSXiu4oKS-ZbzSqLHj0OsWk97Op4XSP885nXI3hVsHEhUZhRNt1cRS3qRx-7PRxyDJs5Ot2Vxwg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-11 02:14:16,657:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-11 02:14:16,657:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:14:14 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042282867 Replay-Nonce: zgT1AlV-e0Jjj5xdZ8upizwPvVNa21z1Qq1o-jArBXMCEa0Q0_Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:36Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182938057" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042282867" } 2024-07-11 02:14:16,658:DEBUG:acme.client:Storing nonce: zgT1AlV-e0Jjj5xdZ8upizwPvVNa21z1Qq1o-jArBXMCEa0Q0_Q 2024-07-11 02:14:16,658:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:14:16,664:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182938057: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1lMEpqajV4ZFo4dXBpendQdlZOYTIxejFRcTFvLWpBckJYTUNFYTBRMF9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODI5MzgwNTcifQ", "signature": "XTweeTQ-LI0fDIeuehk3mxv8glm5LZcSUQNYY7eDgh-A0tJkzP2kaEWeN3lqaSTHONYdXd-ECZEZLgw5Y_57UjABDJRl--zOu-V4IPW29haU43bw5V4RoWbh8-KHrc-nXRvuhvno6XrsL61YOzGuSkd66NEJtmNxrx2EncvrphAnSCPCNk75dmwJ1ROX9xvDNPpNQYYUWn3bzTuBc1_wzrfOJhYI4yrQrEYD0wU3ZAs8CkBxhXYBAd0Mi3O_8K92g_6ZaUJiuZC3g4jv6YODLV0e4AtQFS2yq_1b8i4al_b9585tzK08FQBLuVuPQGZy8q94a-L80pl2F5mq9NZdvA", "payload": "" } 2024-07-11 02:14:16,831:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375182938057 HTTP/1.1" 200 810 2024-07-11 02:14:16,832:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:14 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8US2AKoeB8ygmAV6Y2ERCfa0coX6OwqLvQaem2Ich2szo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:36Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/gtbErw", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/uhlVRg", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/KhzwYg", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" } ] } 2024-07-11 02:14:16,832:DEBUG:acme.client:Storing nonce: eFSVlf8US2AKoeB8ygmAV6Y2ERCfa0coX6OwqLvQaem2Ich2szo 2024-07-11 02:14:16,833:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:14:16,833:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-11 02:14:16,833:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:14:16,834:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:14:16,837:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:14:16,837:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:14:16,837:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:14:16,837:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:14:16,842:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:14:16,885:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:14:17,063:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:14:17,064:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 02:14:17,065:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 02:14:17,069:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-11 02:14:17,069:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:14:17,070:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:14:17,075:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:14:17,075:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:14:17,075:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:14:17,080:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:14:17,081:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:14:17,083:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:14:17,528:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:14:17,529:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:15 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_J46rVgmGKs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 02:14:17,531:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:14:22,438:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8346_key-certbot.pem 2024-07-11 02:14:27,052:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8344_csr-certbot.pem 2024-07-11 02:14:27,053:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:14:27,053:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:14:27,204:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:14:27,205:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6PtO3RubPbno2OblcZzC0Qa0BtEkFK3uzq95YSr2oNB4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:14:27,205:DEBUG:acme.client:Storing nonce: oPjXeLW6PtO3RubPbno2OblcZzC0Qa0BtEkFK3uzq95YSr2oNB4 2024-07-11 02:14:27,205:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:14:27,211:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZQdE8zUnViUGJubzJPYmxjWnpDMFFhMEJ0RWtGSzN1enE5NVlTcjJvTkI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "S098Kaz3QCEr3IFr6kAyMwOjvmvyePoq1qZLiK8Bto05vkur3jp0YF1XT2YZwlIH13J6f7oT2PR1s9_gycOC4wbzC7vhBZerU57K-J_luqKYPV5Smui9FqmqPrg0g9g8E9somgbhtR_q9ffFZ_Gj60Atn2cCvfYE1h-iX7waLZPx6Gl-dYDnlLnqRvuHuzhZ1OB4VHl9FFvP81XUiKpPcxznkIntMDtfO62d-9CPKDHhzKRKUFQHPFNZb9pbXalyUStfojCYg4reA0j0cvoF1RODx5B0j3_5_C8kd1Jr3Ywy_qQqfFz3iHjE_3y7g4JoQa2S9AZLm7B9mABTs6ybrA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-11 02:14:27,386:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-11 02:14:27,387:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:14:24 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042319787 Replay-Nonce: oPjXeLW6ENDBSK-Z1R6vdjZWV3sgN_XAuqbdtYJaarUP5mvlSvE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:48Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182994777" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042319787" } 2024-07-11 02:14:27,387:DEBUG:acme.client:Storing nonce: oPjXeLW6ENDBSK-Z1R6vdjZWV3sgN_XAuqbdtYJaarUP5mvlSvE 2024-07-11 02:14:27,387:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:14:27,394:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182994777: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZFTkRCU0stWjFSNnZkalpXVjNzZ05fWEF1cWJkdFlKYWFyVVA1bXZsU3ZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODI5OTQ3NzcifQ", "signature": "b5ZMJCpAYu6VK2KJDqeUJg8rPDnHpZlc9xpWmKCQpMVLraawZ2PZeqhgIgI6ABzcdyxNvoWlHWbM9A2rCPJQVWSJeungAa3Kr_NtzKd-dRqs3CJU3SzN9bqwsXC7wYXYc_z9tGh9m8fzikA3A36hBHxhAIQAT28AZ_dc1N5kkrk2c7SB9Grw-cuUw6a4BlLQn6UR3LE0tNzrAEv3gSTUtFNsuqoBLY9CIlppmzbZ4nvUIpykIJLrLc7uBp1gnJJsTEsZA2HcJOsQVuuWs1ySvCXFmJZbu1Q3X0Z6gsUS1OrsDaDHt9At8izZkuK87VXXwrG0flUeXe1lb812IcO1-w", "payload": "" } 2024-07-11 02:14:27,560:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375182994777 HTTP/1.1" 200 804 2024-07-11 02:14:27,561:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:25 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqjLNdTW-Afe9LB6fPptCZCUB3WHHNc51EUkkGa2NeohU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:48Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/Qwv2DQ", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/7TjcFQ", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/hJdTTw", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" } ] } 2024-07-11 02:14:27,561:DEBUG:acme.client:Storing nonce: EPg6kJgqjLNdTW-Afe9LB6fPptCZCUB3WHHNc51EUkkGa2NeohU 2024-07-11 02:14:27,561:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:14:27,562:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-11 02:14:27,562:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:14:27,562:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:14:27,563:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:14:27,563:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:14:27,563:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:14:27,564:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:14:27,565:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:14:27,616:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:14:27,824:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:14:27,825:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-11 02:14:27,826:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-11 02:14:27,831:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-11 02:14:27,831:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:14:27,831:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:14:27,836:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:14:27,836:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:14:27,837:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:14:27,852:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:14:27,853:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:14:27,855:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:14:28,323:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:14:28,324:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:25 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LeKKiAx1otw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 02:14:28,325:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:14:33,165:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8347_key-certbot.pem 2024-07-11 02:14:38,066:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8345_csr-certbot.pem 2024-07-11 02:14:38,067:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:14:38,067:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:14:38,224:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:14:38,224:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8USR6f83iIeF7wxly-Fr2AeAfrU21qror9VO8x9x2ji7c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:14:38,224:DEBUG:acme.client:Storing nonce: eFSVlf8USR6f83iIeF7wxly-Fr2AeAfrU21qror9VO8x9x2ji7c 2024-07-11 02:14:38,225:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:14:38,230:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVTUjZmODNpSWVGN3d4bHktRnIyQWVBZnJVMjFxcm9yOVZPOHg5eDJqaTdjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jzkCf-G6cg6V4Ox-aRxKx7u0sQMpSgaqdAa6wGq-rSnp2_na4XApBsykDeCRc1M_M9GDQHvptwbGdHtc3CtlNijh3ukl76aSrKe0bgjZMfOVWFUwjjaXOVlicq306_AHbbpjr89J9L8yQK5esOL1uQLmUEFZ53xgmF1GzuLmFrHumR4pn5VROC-C5P-MQF_d-B4pZHC0KirW7IS5rdAmDHrqH-3waCKdCYYtBSfOJhxwIOQygORzLzAIYs7EjxM83-kpPk98HJtdbJmaqsi-C_XsR8SeMYpdm1MyMMdLfkHLsFFPl5jiXK2gPEyd9h_2KBWZYY84BwfR-vscyVXSag", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-11 02:14:38,414:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-11 02:14:38,415:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:14:35 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042354327 Replay-Nonce: zgT1AlV-vA4o81fDeLW8jLxtW6npHyz2H_-iTyzgRs45k9N1Abg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:59Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183044847" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042354327" } 2024-07-11 02:14:38,415:DEBUG:acme.client:Storing nonce: zgT1AlV-vA4o81fDeLW8jLxtW6npHyz2H_-iTyzgRs45k9N1Abg 2024-07-11 02:14:38,416:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:14:38,422:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183044847: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi12QTRvODFmRGVMVzhqTHh0VzZucEh5ejJIXy1pVHl6Z1JzNDVrOU4xQWJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMwNDQ4NDcifQ", "signature": "hgJMRrFOrHXlnQuEgLrK88_0dGTZr5_gskZfQMJEQ9GE_AkUpOYMWzbSNtY6kKH2sH-ZhQPolbfeSxA7qTN56ywMZXT35qs_SRkXZMjCr2wUbGyb4RKL4tKJQne0VEsu45IqZQNLUJYSTPhs-gUchZ-V4Po8mn4Ju_XHIvDPQiADga6xeemVWd0cBNaJYLo2kbvbZhff8sxFHC4LIcVlQ5vuePSsMrxzN2dVd_rni-NQ7v2ucH1Gge7WXCLCkLQO9zRrIGah-iDGsyl9vBbMcdNTi-8uRo_W436X4PKjiSYcozLLVrcPSePF-9cQfclxqkn7uXfu-swvWUfBVu69sg", "payload": "" } 2024-07-11 02:14:38,595:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183044847 HTTP/1.1" 200 807 2024-07-11 02:14:38,596:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:36 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8USDX3ry7_cr04JRS0i5O8uOH93Ljs7V7F7Ba0VeVu-PA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/MqkCfA", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/OGQ48g", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/eU6s8Q", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" } ] } 2024-07-11 02:14:38,596:DEBUG:acme.client:Storing nonce: eFSVlf8USDX3ry7_cr04JRS0i5O8uOH93Ljs7V7F7Ba0VeVu-PA 2024-07-11 02:14:38,597:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:14:38,597:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-11 02:14:38,597:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:14:38,598:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:14:38,598:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:14:38,599:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:14:38,599:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:14:38,599:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:14:38,600:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:14:38,656:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:14:38,873:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:14:38,874:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 02:14:38,875:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 02:14:38,880:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-11 02:14:38,880:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:14:38,880:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:14:38,886:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:14:38,886:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:14:38,887:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:14:38,902:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:14:38,903:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:14:38,905:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:14:39,387:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:14:39,388:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:36 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gDq5Dpizdpo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 02:14:39,389:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:14:44,910:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8348_key-certbot.pem 2024-07-11 02:14:49,523:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8346_csr-certbot.pem 2024-07-11 02:14:49,523:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:14:49,524:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:14:49,686:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:14:49,686:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-rE5jBdGuMbS8KB8IGWnJ_TcBzO7HyQem857-RICkxAM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:14:49,687:DEBUG:acme.client:Storing nonce: zgT1AlV-rE5jBdGuMbS8KB8IGWnJ_TcBzO7HyQem857-RICkxAM 2024-07-11 02:14:49,687:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:14:49,698:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1yRTVqQmRHdU1iUzhLQjhJR1duSl9UY0J6TzdIeVFlbTg1Ny1SSUNreEFNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Zj8IalkBei-WY4HwFZhROgEZk79EuLFbuvYVVkxYbWv0VA9VV-OUZXl25IRfVe6HQTZCIbdonYSjRaeZaUd1hgwukMkN2soUTb26ing5fnGMtdIosKW1zCViSIis8IBKIdM7A41gx1L5GjSfj2H3Rjj3b9IMZmGs-umD43ULAOwU4JDtxyORafwxzCTMWyhaY8wfNS0NKHknzVwGCp3xm4jAhvRfQeGh0Dhuqo7n0kLK0uMyH-LsqhQXjCO6Egxt8bmipJQzgtGVe3UkX4nV-E14N-mHjTliE29AKeYDBdVOea31VnyJhywr3Awicx9-ZA3xg5pzbST9nA_WPcnQ_Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-11 02:14:49,958:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-11 02:14:49,959:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:14:47 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042400737 Replay-Nonce: eFSVlf8U9FIOd-SYsLQSGkSfT9QeMnwcM5vKP9J3bDsEw-DJiVk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:10Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183108237" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042400737" } 2024-07-11 02:14:49,960:DEBUG:acme.client:Storing nonce: eFSVlf8U9FIOd-SYsLQSGkSfT9QeMnwcM5vKP9J3bDsEw-DJiVk 2024-07-11 02:14:49,960:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:14:49,966:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183108237: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFU5RklPZC1TWXNMUVNHa1NmVDlRZU1ud2NNNXZLUDlKM2JEc0V3LURKaVZrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMxMDgyMzcifQ", "signature": "wU2npekjun8SVX8uhcIlzdwolkR2kYQ3mCFt2-svbsc2ZTVEN0djky_xFpMsnj0TWtt8E-8Qv-UznyVtBBpS53TSE3QMqv8xbikcfTJL2AUDD93aTgKyBzPh0MKeOlfkfLHNgSmElr9scTT8_cyWwl6K9U3jHXLYmKweLfzhvZdcCUS4YNGh44ia2fmMNd69zS7CCBDDehda961dwV9Xyc_btvm7EC7nJl1p-6knnrf0qBaHk5Dm9ERqi_OTGsLQpml6L2vWt946UMgXhNl-BoCVDXNQuAh9mV5-tvaeobPJzrZiiV1P5ZwzjI14vWHJZduttvry5SYVlDTbxIZABA", "payload": "" } 2024-07-11 02:14:50,131:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183108237 HTTP/1.1" 200 801 2024-07-11 02:14:50,132:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:47 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-_7McVoId99sVvUK8zJpm2czhaUbkcanIy__EQRqnZUU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:10Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/2jPgJg", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/MtdTdg", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/1H2g1Q", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" } ] } 2024-07-11 02:14:50,132:DEBUG:acme.client:Storing nonce: zgT1AlV-_7McVoId99sVvUK8zJpm2czhaUbkcanIy__EQRqnZUU 2024-07-11 02:14:50,133:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:14:50,133:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-11 02:14:50,133:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:14:50,134:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:14:50,134:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:14:50,135:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:14:50,135:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:14:50,135:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:14:50,137:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:14:50,204:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:14:50,407:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:14:50,410:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 02:14:50,411:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 02:14:50,419:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-11 02:14:50,419:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:14:50,420:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:14:50,425:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:14:50,425:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:14:50,425:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:14:50,431:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:14:50,431:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:14:50,434:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:14:50,870:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:14:50,870:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:48 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QhGztxFwlkM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 02:14:50,871:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:14:56,360:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8349_key-certbot.pem 2024-07-11 02:15:00,943:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8347_csr-certbot.pem 2024-07-11 02:15:00,943:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:15:00,944:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:15:01,089:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:15:01,090:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6hKvSQ3jjFWTYqPoD3feVcntcVErPE4IlHp96PisnuFU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:15:01,090:DEBUG:acme.client:Storing nonce: oPjXeLW6hKvSQ3jjFWTYqPoD3feVcntcVErPE4IlHp96PisnuFU 2024-07-11 02:15:01,090:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:15:01,097:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZoS3ZTUTNqakZXVFlxUG9EM2ZlVmNudGNWRXJQRTRJbEhwOTZQaXNudUZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JlkM0eQ7IO1e_qHm8rgbovcZOKAsyXHK3exoPs8N_gp3mPSL8sLl4c_pUxsXTg6HyP1G3XGQHidYVqtKYilvWWlJbhpxrJIIztkdigETOS_RWND2nSQ1PQmeoPH7XqusFsAckqNGawiiRLrEqGQSiku1kl-j15kkINzycyx3DdlGgQ4pE6h-1HLeWY6YqLLb0NnYYCVoQmVJ4udTKiFSXHheXHdc2wc5G-skDSj8XUG0-aXjCgs0_1Y3YZtaGJs2ig5ASqRNyU-O8D5SLJ-QpPhGNXYPqBhW3X9IbFU-una4FNz0bf8U6AHgphECrLzQXqDk5RHv-2K5KvU0S2UdNw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-11 02:15:01,323:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-11 02:15:01,323:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:14:58 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042441707 Replay-Nonce: EPg6kJgqTKdAWlgoavF10vEBbaokEODd8DVszzQwi6TtHDlqxWA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:21Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183170507" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042441707" } 2024-07-11 02:15:01,324:DEBUG:acme.client:Storing nonce: EPg6kJgqTKdAWlgoavF10vEBbaokEODd8DVszzQwi6TtHDlqxWA 2024-07-11 02:15:01,324:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:15:01,330:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183170507: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FUS2RBV2xnb2F2RjEwdkVCYmFva0VPRGQ4RFZzenpRd2k2VHRIRGxxeFdBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMxNzA1MDcifQ", "signature": "gF2yiaKDwACMSZU4mM3YQllXHLtz8jE96METNX2ddQB7td3ORDmznCn1SRbF3vEbUG_NCmXvL6qzHlPdCVAuKG6cSVRzYZnmnZzAUviBxcFFSYHO6cYSokJJZGFiQ07jqoGHxOFLLVimyWtWogZOGC_MGflD4LdmFr0AyvsZdRHdEQKMIJrQwawlfKx1tFnqZ32gXHketQ6v6msABfaHnFrKJCW5Qnb8pmEM-UDg2IwTu0xVw5r-ghxU2-la6k7QZTuC_P7pJ3EpjoQ8MwmA1ZdHpgjCaLTAStA9t-JTDCOWYydJqD8RmU3dJp2sA8OdHPykkZKCmXtn_SV2p9pxiw", "payload": "" } 2024-07-11 02:15:01,481:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183170507 HTTP/1.1" 200 805 2024-07-11 02:15:01,482:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:59 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6mj-M12p3VMaG4ECo5enIchIllDUmVzT7qg25AqLakr4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/LCB2Ww", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/I9mxAw", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/UAlFYQ", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" } ] } 2024-07-11 02:15:01,482:DEBUG:acme.client:Storing nonce: oPjXeLW6mj-M12p3VMaG4ECo5enIchIllDUmVzT7qg25AqLakr4 2024-07-11 02:15:01,483:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:15:01,483:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-11 02:15:01,483:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:15:01,484:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:15:01,485:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:15:01,485:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:15:01,485:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:15:01,485:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:15:01,487:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:15:01,527:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:15:01,716:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:15:01,717:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-11 02:15:01,718:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-11 02:15:01,724:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-11 02:15:01,724:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:15:01,724:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:15:01,730:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:15:01,730:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:15:01,730:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:15:01,735:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:15:01,736:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:15:01,738:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:15:02,174:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:15:02,175:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:14:59 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "YC-jpWaHOX8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 02:15:02,175:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:15:06,950:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8350_key-certbot.pem 2024-07-11 02:15:11,379:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8348_csr-certbot.pem 2024-07-11 02:15:11,380:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:15:11,380:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:15:11,526:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:15:11,527:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6DeXx_IuVBgy_prWIZ_VlZz0Kek1Cp18XMU1Dz76fjZ8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:15:11,527:DEBUG:acme.client:Storing nonce: oPjXeLW6DeXx_IuVBgy_prWIZ_VlZz0Kek1Cp18XMU1Dz76fjZ8 2024-07-11 02:15:11,527:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:15:11,533:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZEZVh4X0l1VkJneV9wcldJWl9WbFp6MEtlazFDcDE4WE1VMUR6NzZmalo4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MK9QCFa3McTlvmmgiQYnYPRFgl0elkDFSF6FBvswfzO7DWA7ESdZXw1uPz41nHWnqG1FV2iLDhpNTak_fdlzq-nF0LPX8e4cWyJzcUwSabJRo4GXmGhps3sJYYoIUzeJhgIKqk90h5WjH2s1W88vunqgwtOqaqXR6YsMIYo6ad9rrkkpt6Bo3crroHlVE_qMneht5WmU0L1xGRgMvA9ECNoMiKuKmYoD9gWJ3pHAl0NJoSod9chhuxweC_LQRUQScMVXoYTGeKAftgq_uyfpC6I3xPr36TdClR_mxWjD5ViXmJnu4OEtlO9qDEfjs4rqfQMLhpsY1KFChFd61qSZnQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-11 02:15:11,718:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-11 02:15:11,719:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:15:09 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042480887 Replay-Nonce: oPjXeLW6qaaGsbPp6BJUpGKsjP3mIPAOZcaPNbIgTpPiVUHGdak X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:32Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183227457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042480887" } 2024-07-11 02:15:11,719:DEBUG:acme.client:Storing nonce: oPjXeLW6qaaGsbPp6BJUpGKsjP3mIPAOZcaPNbIgTpPiVUHGdak 2024-07-11 02:15:11,719:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:15:11,725:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183227457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZxYWFHc2JQcDZCSlVwR0tzalAzbUlQQU9aY2FQTmJJZ1RwUGlWVUhHZGFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMyMjc0NTcifQ", "signature": "BEZDgK2MBlJcoex59eki-8OS5OR9VUkEdxpXc9b1MgaFy12WPwbuIdfi8ZlKmYEVEMHfOgbHDnbXRTtt5QN87EUvYaB1grN60C3evgstpB-G9nej0DI_K_ABxdYo8aLty86BDG4f0RIdhP_lzv8rhYrGtyi2NS-SnaaFT2GV8S4PratxtXgCYuwwctqkgJa6dRnPr-vX1sBY0yl22DdffcWXCWEFx4XBVBFsCu7sRPYr-bm3fDJ-wP46HphzwWx0lPcdTuzOfT3mUbZy3I9k6lbeVAivcuX0qcEMXop5zWgBvni1rZ8kv_C1_gnDSAC9GKQegz7lOc4ZSo5DjDMiRg", "payload": "" } 2024-07-11 02:15:11,875:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183227457 HTTP/1.1" 200 809 2024-07-11 02:15:11,876:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:09 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqVDRWn6OSJ-ncj0l20IIZCPzNsTicDpnUKHThNNHaJxo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/Us5Z1g", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/XssHxw", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/UVYPXQ", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" } ] } 2024-07-11 02:15:11,876:DEBUG:acme.client:Storing nonce: EPg6kJgqVDRWn6OSJ-ncj0l20IIZCPzNsTicDpnUKHThNNHaJxo 2024-07-11 02:15:11,877:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:15:11,877:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-11 02:15:11,878:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:15:11,878:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:15:11,879:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:15:11,879:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:15:11,879:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:15:11,880:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:15:11,882:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:15:11,939:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:15:12,136:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:15:12,137:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-11 02:15:12,138:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-11 02:15:12,142:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-08-06 23:03:56 UTC. 2024-07-11 02:15:12,142:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:15:12,142:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:15:12,147:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:15:12,147:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:15:12,148:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:15:12,152:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:15:12,153:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:15:12,155:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:15:12,634:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:15:12,635:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:10 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "ynEZNw-DH74": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-11 02:15:12,635:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:15:17,703:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8351_key-certbot.pem 2024-07-11 02:15:22,136:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8349_csr-certbot.pem 2024-07-11 02:15:22,137:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:15:22,137:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:15:22,297:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:15:22,298:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UIdeHTwh4kDFvBCvC4t_cRAuuooBiBhVI9ExYR-4YVxk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:15:22,298:DEBUG:acme.client:Storing nonce: eFSVlf8UIdeHTwh4kDFvBCvC4t_cRAuuooBiBhVI9ExYR-4YVxk 2024-07-11 02:15:22,298:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:15:22,304:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVJZGVIVHdoNGtERnZCQ3ZDNHRfY1JBdXVvb0JpQmhWSTlFeFlSLTRZVnhrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "apJIaqmUuzj5ID447mPaxn5wKIl5a1CcETQTA62i6tTYD3oLQijJELfSWuRQ2BsSqpTVwp5Q9jafh6_5SOxZ0snR-m6TbNgkb23-gAuzYFOX_DojBjRvyQz6mWdnLOln1z7RCG00xR0s_UPc4WbJpyT9K_IgoALPVmUFX2qSS_m1ZUURYmQ-sfEPA84Fmrmm6wzDyzQ3eb3fshPz0X3iREDPZn-80yFFOzO3z5IV5tEzbeB8ce8CcnAote0WddeFwBo2OxRKOS3ei8Lfn2k_wl8qUGaAZODEbvxbOmkB88wtbzt9Q6mx3Wf8260usu5fKg9KJptJ2wITbMv4sL0flQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-11 02:15:22,491:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-11 02:15:22,492:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:15:20 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/285341919627 Replay-Nonce: zgT1AlV-YJ6bYNv-j7HNsDUaqQmUCJB3LZtANh7pNJWjSIPzDqQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-15T04:13:07Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/285341919627" } 2024-07-11 02:15:22,492:DEBUG:acme.client:Storing nonce: zgT1AlV-YJ6bYNv-j7HNsDUaqQmUCJB3LZtANh7pNJWjSIPzDqQ 2024-07-11 02:15:22,492:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:15:22,498:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1ZSjZiWU52LWo3SE5zRFVhcVFtVUNKQjNMWnRBTmg3cE5KV2pTSVB6RHFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzQxNTAyMDI0NDcifQ", "signature": "DPNIrz0XBxe6VVLWKKPEcYAGB9u06Dd8H796b_eTNPc0NTL7UTM9_1dXtzBbd2NZVpm4Vpe6kCw5FSEFeJ3j3HHAYe5NbpyFoYiKvucUpzGVLblNmWJwujRrmB7nDfWeDJ2g-2wmFMjrRVGGExT4Bu3Z6oTTuR2MzBVqUlHsP1Ie2-0eU_xvO1018syjDqPK7dxIMuypTFPuOOmfA9YeMpTEaAOp-xkYEEUqbb-RruEHo6R7lqnlN-1OrmtTWQlxU1LR6c_yNseg1iMlnMw_uMhbpsm-J89VJ_UFJUq40zq54hcB_vGft86oJKux13OlY0kVCCzC4KnMROEU3SlH8w", "payload": "" } 2024-07-11 02:15:22,675:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/374150202447 HTTP/1.1" 200 807 2024-07-11 02:15:22,676:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:20 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-nB6GdLSeHSiVbSJXd_8ICiUflSm5RjXO11-vNUKQpt0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-15T04:13:07Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/NY8rUA", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/R0qBhg", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/2vSv0A", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" } ] } 2024-07-11 02:15:22,676:DEBUG:acme.client:Storing nonce: zgT1AlV-nB6GdLSeHSiVbSJXd_8ICiUflSm5RjXO11-vNUKQpt0 2024-07-11 02:15:22,677:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:15:22,677:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-07-11 02:15:22,678:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:15:22,678:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:15:22,679:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:15:22,679:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:15:22,679:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:15:22,679:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:15:22,680:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:15:22,720:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:15:22,929:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:15:22,930:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 02:15:22,931:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 02:15:22,935:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-11 02:15:22,936:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:15:22,936:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:15:22,941:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:15:22,941:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:15:22,941:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:15:22,946:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:15:22,947:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:15:22,950:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:15:23,416:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:15:23,417:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:20 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6VuMsRJO_yc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 02:15:23,417:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:15:27,914:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8352_key-certbot.pem 2024-07-11 02:15:32,306:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8350_csr-certbot.pem 2024-07-11 02:15:32,307:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:15:32,307:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:15:32,464:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:15:32,464:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-YtGMvrFMplx1sN6-z4RhvSzOJkgfLeHfKtS8c0PqhmU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:15:32,465:DEBUG:acme.client:Storing nonce: zgT1AlV-YtGMvrFMplx1sN6-z4RhvSzOJkgfLeHfKtS8c0PqhmU 2024-07-11 02:15:32,465:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:15:32,471:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1ZdEdNdnJGTXBseDFzTjYtejRSaHZTek9Ka2dmTGVIZkt0UzhjMFBxaG1VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DJYlFPUfMi9YreC8IzQTQMy4hnDosjF5gfP82jlv4ddsap1D10l0A6tji917rNlyOcXhdkeetFOMT76n2KBUy-CdC2LH29AQqz0ndtnBpH66NzSa8NH9aSz3mNqdQLwFCDEkTipiKbc8Rvm-js6UnCf8loezRfUI-XuUxFPqnE_olBNhREoL-3-vgqNh2pdnNTxINKiMDLVG8yzejPHwab6tZHPXfItrOGR2LuqXI8rIk0JrOGC7Qv7oj384da2hjZeEY8c42ulYzPe1vQx4sYAabtdHmUKDtMUnsmwrOEyjBZm5Ai2GncohzxtI-dRSjt3eSE5q6W-secyXuJUUEw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-11 02:15:32,653:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-11 02:15:32,654:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:15:30 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042554147 Replay-Nonce: zgT1AlV-V9obsfZUacP5PySkedv9bf1O54tdW2PTGSTt2xlMoSg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:54Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183336527" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042554147" } 2024-07-11 02:15:32,654:DEBUG:acme.client:Storing nonce: zgT1AlV-V9obsfZUacP5PySkedv9bf1O54tdW2PTGSTt2xlMoSg 2024-07-11 02:15:32,655:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:15:32,661:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183336527: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1WOW9ic2ZaVWFjUDVQeVNrZWR2OWJmMU81NHRkVzJQVEdTVHQyeGxNb1NnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMzMzY1MjcifQ", "signature": "KafTbQcGRXNkAvhuK7QM6r97a5DlKwYuUEwZ699Ht1T-hcLZBJ-u__5oRgp95DnZ6geBaMCIadKfyy5cwjxOczIKITe5V6_ANiZegKEb2SmSuQ6mHhGfGnZcy_Bcwq9bC3GGe_cMb2W3R6VsmvHpncpRqSNiD4SbrRJoCBO7whBtNTBfOb9TMxehBQ2ASwGN8ok7751opK-wK7W04xdTENyLLMnB60BDHRmUPiWH33U8F1NZMDbf7-OjNq_xDEvOvx168_pPDNdFjPFbctvO20QevCS5xDvOk9Wv35ti237UUBPc_nF_6-8xi4ysK9qt1A--o49HsgEEPsWD_2_i7g", "payload": "" } 2024-07-11 02:15:32,823:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183336527 HTTP/1.1" 200 806 2024-07-11 02:15:32,824:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:30 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UsGm3WF9Q6WD1n2A-PqSpuVw5lx3l4ULLxzK5-KYderQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:54Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/LtvPaA", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/uTcC3A", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/tbjSgg", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" } ] } 2024-07-11 02:15:32,824:DEBUG:acme.client:Storing nonce: eFSVlf8UsGm3WF9Q6WD1n2A-PqSpuVw5lx3l4ULLxzK5-KYderQ 2024-07-11 02:15:32,825:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:15:32,825:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-11 02:15:32,825:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:15:32,826:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:15:32,827:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:15:32,827:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:15:32,827:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:15:32,827:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:15:32,829:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:15:32,884:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-11 02:15:32,884:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:15:32,885:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-11 02:15:32,892:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-11 02:15:32,895:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-11 02:15:32,895:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-11 02:15:32,895:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-11 02:15:32,896:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-11 02:15:32,897:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-11 02:15:32,937:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:15:33,159:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:15:33,161:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 02:15:33,161:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 02:15:33,166:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-11 02:15:33,166:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:15:33,166:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:15:33,178:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:15:33,179:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:15:33,179:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:15:33,186:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:15:33,187:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:15:33,190:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:15:33,670:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:15:33,671:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:31 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "44I3_sfNJE8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 02:15:33,671:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:15:38,387:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8353_key-certbot.pem 2024-07-11 02:15:42,859:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8351_csr-certbot.pem 2024-07-11 02:15:42,859:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:15:42,860:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:15:43,019:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:15:43,020:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8U3hxKivDGM6QcqRgcmONA5mV5U1otGWQ4hgix01-A3ZA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:15:43,020:DEBUG:acme.client:Storing nonce: eFSVlf8U3hxKivDGM6QcqRgcmONA5mV5U1otGWQ4hgix01-A3ZA 2024-07-11 02:15:43,021:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:15:43,027:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFUzaHhLaXZER002UWNxUmdjbU9OQTVtVjVVMW90R1dRNGhnaXgwMS1BM1pBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KG7GRW5doNrUwi5dRh0ykzQNMpCTUGb_26vHTrD64kX7S3RV1pKz2hWn-kUM9oKqSFlUZ7JTUe_Z7zEbvLNWH293xeLBaJcrl-9930Q9yOnQgLrEMs28oBplvLl1YZ-QmnoAGJIP5PilMuGx_ttzT8rxNOpcvEAsBO3kuRemZ_8moAMNbErIAu9KFy8WtaTkK0nlSzJtnwVIH-OZUXEMnmmwirxtk3hor2A4tdLVJKnCYH5_53ScC9RXf4kEhW70gLlseD9gzpWK8-2zsffdxlGSYWgvoQHSSDpyft0YqYa03DGb7Iwtoii4-UNcheUVetjiwjD0wGOQcD9lwBdYkw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-11 02:15:43,212:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-11 02:15:43,213:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:15:40 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042595287 Replay-Nonce: eFSVlf8UW-jbs8T7naMSqRD0NyZwM5AJeWRH4ffH9IAqU4wdCEM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:05Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183394907" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042595287" } 2024-07-11 02:15:43,213:DEBUG:acme.client:Storing nonce: eFSVlf8UW-jbs8T7naMSqRD0NyZwM5AJeWRH4ffH9IAqU4wdCEM 2024-07-11 02:15:43,213:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:15:43,224:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183394907: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVXLWpiczhUN25hTVNxUkQwTnlad001QUplV1JINGZmSDlJQXFVNHdkQ0VNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMzOTQ5MDcifQ", "signature": "Hhg5zJ5G-n9-697DhaenMScAjNncnRdMpk0sLH1a9jKySjCT02ohMA2RzDa2RmUbWlF_B8ZIcLak_ahfdKclfnVQ5CozVXg0rBCrzzAuBOn3CPLWxTP3ADfT7JoGbgx2fu2v8afEIw3dfWqtcpRyRGm1vPyi2Z7uZ8VbXd9d-bMnsoJGd-tErGE5ivYIy3mcz56UkTZfh_nq1ghVXCo7_hyTbpjM_EdvmQMpLx6htFGrS6QDA3xgC7EUhWxwX6x009_T9Z19CKP5oLxVfdiLItzcLdElQbdDPuqxbj6XWs2LgMk8CPOQE75Tk3IY7DFv_10SDe4TpLNtSXf_JAEvfA", "payload": "" } 2024-07-11 02:15:43,391:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183394907 HTTP/1.1" 200 811 2024-07-11 02:15:43,391:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:40 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8U7ubPD8-PfYg83UTgOieFwerCM0-sskFICnWeFsRkh0I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:05Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/78vQQw", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/p4w28w", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/j5xMwg", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" } ] } 2024-07-11 02:15:43,392:DEBUG:acme.client:Storing nonce: eFSVlf8U7ubPD8-PfYg83UTgOieFwerCM0-sskFICnWeFsRkh0I 2024-07-11 02:15:43,392:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:15:43,393:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-11 02:15:43,393:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:15:43,394:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:15:43,394:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:15:43,395:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:15:43,395:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:15:43,395:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:15:43,397:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:15:43,448:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:15:43,643:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:15:43,646:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 02:15:43,648:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 02:15:43,656:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-11 02:15:43,656:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:15:43,656:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:15:43,661:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:15:43,661:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:15:43,662:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:15:43,666:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:15:43,667:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:15:43,669:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:15:44,115:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:15:44,116:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "j3EcPgSh1Eg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 02:15:44,116:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:15:48,831:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8354_key-certbot.pem 2024-07-11 02:15:53,477:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8352_csr-certbot.pem 2024-07-11 02:15:53,477:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:15:53,477:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:15:53,631:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:15:53,631:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgq51KUpBbJmgQ7RqO5gfqID-W_1B1vCpaeypgYH66iQq0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:15:53,632:DEBUG:acme.client:Storing nonce: EPg6kJgq51KUpBbJmgQ7RqO5gfqID-W_1B1vCpaeypgYH66iQq0 2024-07-11 02:15:53,632:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:15:53,639:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3E1MUtVcEJiSm1nUTdScU81Z2ZxSUQtV18xQjF2Q3BhZXlwZ1lINjZpUXEwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SV3LZzXuy9wF1ZPIt43fW90OE79u6LAT0UBSn7cXN-glpSVS6bPtltG_fuFVJPKLqZVclbc9ESjuOIqpMakb5DYOF8r_EZEu9e97BfQa3fAm7xz_Yz8dZGtKoyHDjtrjNYOnCKyQn8tiUw6-q2hogWXN4UO3OcSygCj85scqpsk4IPDBNQstUbollwHJlYMn5tFX28IEOH9ltrcqpPwduFcOdXwZSH0F3ge9CJdqxwD-0oZaIX2DcQuXDNJ3Ihb317rPiYyS4WWJg1o2FAdd8EslVqo2TKBDlMen45jp3S9feHY231XC6N73E3Cy7E3RzOkGZcQueTsyfXeZRXpg9w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-11 02:15:53,816:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-11 02:15:53,818:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:15:51 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042636517 Replay-Nonce: EPg6kJgqUQnmTYCfl1NQZwWTJftvM0KBQYFLYMeiHb6aBz57HTM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183457817" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042636517" } 2024-07-11 02:15:53,818:DEBUG:acme.client:Storing nonce: EPg6kJgqUQnmTYCfl1NQZwWTJftvM0KBQYFLYMeiHb6aBz57HTM 2024-07-11 02:15:53,819:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:15:53,825:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183457817: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FVUW5tVFlDZmwxTlFad1dUSmZ0dk0wS0JRWUZMWU1laUhiNmFCejU3SFRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM0NTc4MTcifQ", "signature": "nKrGEaGV8qM4wk7Ly4mxMpNIC6hrhSvxM_-8t2UN8F3m7k8amjp3Ar686fM-lS8fTZp7-gmxjI0NpCYl-g7YAO_x7dq83qhzNd1sQhfKbffjiGuxlsl3HnaN9q08oOwItlofptAOVpZugzQ3wRs0HLT6draaXS-B2XsgYeQw45CTYq8f17zz53Kz1luwBBJWuhgRtwClyJ4Tm7CNnHWEmxMnn5JE_dgdDrQeP1JIK0pgPmpfD6Pg1hu7KK97IUkfhh5kcE2WUQ3GCIWC_1d2ujyvWjHeLnK68stteRTPYZCWtfdMww1NHB-AlRyZgxk5YmTc-eoWMAfu8l4i4MrWTw", "payload": "" } 2024-07-11 02:15:53,979:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183457817 HTTP/1.1" 200 810 2024-07-11 02:15:53,980:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:51 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqs29frbjpJ_GFz1JmWn83a_Xnp7RbdPDIeq5_42DsMgU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/RejdSQ", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/r4Hc4w", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/l3Nghg", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" } ] } 2024-07-11 02:15:53,981:DEBUG:acme.client:Storing nonce: EPg6kJgqs29frbjpJ_GFz1JmWn83a_Xnp7RbdPDIeq5_42DsMgU 2024-07-11 02:15:53,981:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:15:53,982:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-11 02:15:53,982:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:15:53,983:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:15:53,983:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:15:53,984:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:15:53,984:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:15:53,984:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:15:53,985:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:15:54,042:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:15:54,234:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:15:54,235:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-11 02:15:54,236:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-11 02:15:54,240:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-11 02:15:54,240:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:15:54,240:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:15:54,246:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:15:54,246:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:15:54,246:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:15:54,250:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:15:54,251:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:15:54,253:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:15:54,738:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:15:54,739:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:15:52 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "rwcmQljEbNU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-11 02:15:54,740:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:15:59,438:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8355_key-certbot.pem 2024-07-11 02:16:03,958:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8353_csr-certbot.pem 2024-07-11 02:16:03,958:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:16:03,959:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:16:04,121:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:16:04,121:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:16:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-pne5Ym6vM0d4ljPNsQm58OIZ-OX77FBybMqDEq0p1DY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:16:04,121:DEBUG:acme.client:Storing nonce: zgT1AlV-pne5Ym6vM0d4ljPNsQm58OIZ-OX77FBybMqDEq0p1DY 2024-07-11 02:16:04,122:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:16:04,128:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1wbmU1WW02dk0wZDRsalBOc1FtNThPSVotT1g3N0ZCeWJNcURFcTBwMURZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dmmOq7WLkR5NcEeSXzT_e2BhdEbwjMBTAsP5Nnax86ThnllKuIR3byUlCGJr1B-oRB9YtREn8PO1kBdyBZwNip9d3OJVt2TSWG0dR4QRiLIYuRE9HSxKwalCxe_Ek2XKoS8n1qL-8IMLyM7kDgh7U_0_ALhlsm7TVF2jqrgTMOO6kgSg8YHEggtA7ru2oqNdM34oXAoLto0pAWkMzFXfg2KDukHwz64iArNUosd9BGbrcnNPq4Nr0rsFeBoMvr-a4tnHDvrWenWHZutj6CxGtT0QOmzoiRt3rD0f3LCuBU3U4plQ_1vqy81bI7u4zhfeSJufF7N776KEqXFTeBbOeA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-11 02:16:04,325:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-11 02:16:04,326:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:16:01 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042672187 Replay-Nonce: zgT1AlV-3gJA67iHPI9ErLj3OyAd5KyVCqkLt1rt8yiOMa-F0DU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:27Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183510157" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042672187" } 2024-07-11 02:16:04,326:DEBUG:acme.client:Storing nonce: zgT1AlV-3gJA67iHPI9ErLj3OyAd5KyVCqkLt1rt8yiOMa-F0DU 2024-07-11 02:16:04,327:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:16:04,332:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183510157: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi0zZ0pBNjdpSFBJOUVyTGozT3lBZDVLeVZDcWtMdDFydDh5aU9NYS1GMERVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM1MTAxNTcifQ", "signature": "qGcreFLwkiB3VgPruwn8WInG8aEEJvOhmI9FZ8hiHN5BTXB3pSzrki_UNFpTscIK1CavGxpU7n_c2s5USvU5wW40_RI02IA9gqN_QfNVLdZRXs90_LvZtFrJ-WQOvyY9Ud2SK2PdqK21WaI5STePrz_6ShWzh5OtbcIEtzhZ4Paq0LhFuwaJd7hVUZVf_9l6Eqnn-W7gC_fMwaA6S3kAfKMNI58hVLPcLc48uqnb29UndcRRhCNxbTaPytaECxaVw6CHyGRsdRbnFSEZj8tMnX4sYjbdj9iWqLGn0NzrBkxUR6aVwGzY_XEooWX3ixFk5l-uY-DOEwL4KXE9-loZkA", "payload": "" } 2024-07-11 02:16:04,498:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183510157 HTTP/1.1" 200 809 2024-07-11 02:16:04,499:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:16:02 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UOKtt30Sb9Ky9iatsvIcKg0R0enqoWv39rBJ3FzrHb6o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:27Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/9E6R1w", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/8v5Buw", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/2WSNJg", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" } ] } 2024-07-11 02:16:04,499:DEBUG:acme.client:Storing nonce: eFSVlf8UOKtt30Sb9Ky9iatsvIcKg0R0enqoWv39rBJ3FzrHb6o 2024-07-11 02:16:04,500:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:16:04,500:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-11 02:16:04,501:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:16:04,501:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:16:04,502:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:16:04,502:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:16:04,502:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:16:04,503:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:16:04,504:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:16:04,552:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:16:04,774:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:16:04,775:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-11 02:16:04,776:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-11 02:16:04,780:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-11 02:16:04,780:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:16:04,781:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:16:04,788:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:16:04,788:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:16:04,788:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:16:04,793:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:16:04,794:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:16:04,796:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:16:05,244:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:16:05,244:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:16:02 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "2qf-xxdp3yM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 02:16:05,245:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:16:10,291:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8356_key-certbot.pem 2024-07-11 02:16:14,780:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8354_csr-certbot.pem 2024-07-11 02:16:14,780:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:16:14,781:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:16:14,931:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:16:14,931:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:16:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6obVg8lRjLIPPXRlsFiBdrFoOC1KlxXWm2EFxd7Xgl80 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:16:14,932:DEBUG:acme.client:Storing nonce: oPjXeLW6obVg8lRjLIPPXRlsFiBdrFoOC1KlxXWm2EFxd7Xgl80 2024-07-11 02:16:14,932:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:16:14,939:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZvYlZnOGxSakxJUFBYUmxzRmlCZHJGb09DMUtseFhXbTJFRnhkN1hnbDgwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fnPLS94wUrgYvU8iPhuQi4b7Lcl8jqI6Ki_vns8yKIWkX1zB2sBt6VreTuUbjDvhEuCJALTxKoPSpCyVINCIGkxT2JHNrwNdo4zAGreyzneB8iXTcd3IR8Yxld9LRZ3u6ac2GxOEt_2qikodfbDTWKAEMD-KNwK-ddgLRnJjpeBXGz5NqTRtgQMuZ2HLEPJYLkyaTjEaJkQCAaCmjRbT3-ummFb73ZApL9SWseeF3x4Vx8elmp73YZJcriesC5dLIBzbZAQSG3u24zL7zTldGyBqAevYCsm-y2-edvvIpNQSL5w9zhwn-u_wRaTVEionIxkspBjb8jd577t8Wk-PdQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-11 02:16:15,120:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-11 02:16:15,121:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:16:12 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042704307 Replay-Nonce: EPg6kJgq0H5734md5hTmnQcnBQmH0uCpzQ6q255A1DantL6PLMw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:37Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183559397" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042704307" } 2024-07-11 02:16:15,121:DEBUG:acme.client:Storing nonce: EPg6kJgq0H5734md5hTmnQcnBQmH0uCpzQ6q255A1DantL6PLMw 2024-07-11 02:16:15,121:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:16:15,127:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183559397: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3EwSDU3MzRtZDVoVG1uUWNuQlFtSDB1Q3B6UTZxMjU1QTFEYW50TDZQTE13IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM1NTkzOTcifQ", "signature": "LVSI_JRkr_WC-ELCoJ3ujmnCxMp-h_ZhVXwpORaZjof0PtGSFev9z9faf4Fqkm4GGYdDPKeIpL91ZhKNJWC5sD_pnUqsNjuJk0e8vtf9QZbPSqJel2Ip-mxozSHGETQqBKgPFpBGyWGKDK3K9GiYI4jWioCcQP3_tXtqxpa6lodN_6CB4cmNWj6kwi4WAMroqsRvDRgHhdf9UVRoVXP5F73lUSvsOHJETwUzoSiF1RayJHP6nKp3iu0JGDuTgCUhjTlBVeMYnGGBAE9xzD-dls404ikUQwV9WmMglHAm7aCybYVUZZFHhnE0JczvolyKaIbe36z0FeSw9RAKiuDr9Q", "payload": "" } 2024-07-11 02:16:15,282:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183559397 HTTP/1.1" 200 805 2024-07-11 02:16:15,283:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:16:12 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6cutbdTN5Ar4H5Pnqx0DY_K2GRJAhABZPvTRjz9Hg3LU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:37Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/8Y1D2A", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/nFVVvA", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/ITyESg", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" } ] } 2024-07-11 02:16:15,283:DEBUG:acme.client:Storing nonce: oPjXeLW6cutbdTN5Ar4H5Pnqx0DY_K2GRJAhABZPvTRjz9Hg3LU 2024-07-11 02:16:15,284:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:16:15,284:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-11 02:16:15,285:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:16:15,285:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:16:15,286:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:16:15,286:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:16:15,286:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:16:15,286:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:16:15,288:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:16:15,328:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:16:15,541:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:16:15,542:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-11 02:16:15,543:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-11 02:16:15,548:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-11 02:16:15,548:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:16:15,549:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:16:15,554:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:16:15,555:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:16:15,555:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:16:15,560:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:16:15,561:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:16:15,564:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:16:16,053:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:16:16,053:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:16:13 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "xUY4hak7kuk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-11 02:16:16,054:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:16:21,276:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8357_key-certbot.pem 2024-07-11 02:16:25,888:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8355_csr-certbot.pem 2024-07-11 02:16:25,888:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:16:25,888:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:16:26,051:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:16:26,051:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:16:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-PBzUXM6w7FYOX3OWkiz7GWGT3TcGrmQt4_OCmGY5Ul8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:16:26,052:DEBUG:acme.client:Storing nonce: zgT1AlV-PBzUXM6w7FYOX3OWkiz7GWGT3TcGrmQt4_OCmGY5Ul8 2024-07-11 02:16:26,052:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:16:26,058:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1QQnpVWE02dzdGWU9YM09Xa2l6N0dXR1QzVGNHcm1RdDRfT0NtR1k1VWw4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZNzPYoGojSWbpqffZL34Tszqf58UX7w1XEpPd2VfqzJDY3JWleXPpit3z46aIpXjtppf20vjk-rPYB-g3odM4DfwnAdL9gZVpRDRqKr5hlPavbev2tzwUDJs4EjTz-5eXcK8GP2w1Tiw4kCQU5bpdJps2qWOF034HuUzzHSkw2snhmRDUh7-d8fRqVVbVz2k472qWmjhupSNlcozMM4wi7Ti_Hbx8PRzZOq4697_rYucOWIkYfAvoFWAg7nv_jO0FWD3e-TlAY4PNHvsYc1Zf3LjIc08LPX1d_oTrPLdTzj52s4jQ-3DzlqMHVfT3dcdxAvGBVY2HljslpJGjauItQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-11 02:16:26,255:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-11 02:16:26,256:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:16:23 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042741137 Replay-Nonce: eFSVlf8Uu_FV2PnVBoeiqKrJPDLb3YXAvOdsYM8fzsP1A3TV9v8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:49Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183613287" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042741137" } 2024-07-11 02:16:26,256:DEBUG:acme.client:Storing nonce: eFSVlf8Uu_FV2PnVBoeiqKrJPDLb3YXAvOdsYM8fzsP1A3TV9v8 2024-07-11 02:16:26,257:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:16:26,264:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183613287: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFV1X0ZWMlBuVkJvZWlxS3JKUERMYjNZWEF2T2RzWU04ZnpzUDFBM1RWOXY4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM2MTMyODcifQ", "signature": "mAy-WyGywfFpJDRlB6kTbE_vh0OZ7-BOiCZynj-gboraicWX_mntGa6DM_D3fyYqudGH8J_Q1ydzTWndJINOBngIR13BS6mBIZ2GA51bn8zqK-18BEzJnervyewQo45We3vLYzToQ3ZQf7vV1V59QuXO-e8L9-3upiTt-SQnGaiD5s0Dzo-OUQ0yjN70nZd-Be2JAIileAhapBsBVYbXr0BSz9Yrp3XEUZwvhUSXNHQQR-V4C9nie3x9kig3ZQfFRXJnpl9dSq92XRXLMSq0VuIE6pOKC286QovHFUNFWG4oupF0zRRnEXto1vdo6ciLEiVrWSxHp93SNU7KbH0cCQ", "payload": "" } 2024-07-11 02:16:26,432:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183613287 HTTP/1.1" 200 805 2024-07-11 02:16:26,433:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:16:23 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UdvwuOYOs-RroiRCAJOWpjePee-p1hA9VLgZlQ8YP9-4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:49Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/Dj3vNw", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/EcZFOg", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/OjEpqw", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" } ] } 2024-07-11 02:16:26,433:DEBUG:acme.client:Storing nonce: eFSVlf8UdvwuOYOs-RroiRCAJOWpjePee-p1hA9VLgZlQ8YP9-4 2024-07-11 02:16:26,434:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:16:26,434:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-11 02:16:26,435:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:16:26,435:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:16:26,436:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:16:26,436:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:16:26,436:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:16:26,437:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:16:26,438:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:16:26,493:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-11 02:16:26,736:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-11 02:16:26,737:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-11 02:16:26,738:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-11 02:16:26,742:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-11 02:16:26,742:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-11 02:16:26,743:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-11 02:16:26,748:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-11 02:16:26,748:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-11 02:16:26,748:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-11 02:16:26,753:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-11 02:16:26,754:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-11 02:16:26,756:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-11 02:16:27,208:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-11 02:16:27,208:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:16:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "25N0EhdTR18": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-11 02:16:27,209:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-11 02:16:32,224:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8358_key-certbot.pem 2024-07-11 02:16:36,763:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8356_csr-certbot.pem 2024-07-11 02:16:36,763:DEBUG:acme.client:Requesting fresh nonce 2024-07-11 02:16:36,763:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-11 02:16:36,914:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-11 02:16:36,915:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:16:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqvIa9Dsgsfik3C0uglan0St2xf5oYjtsdY3vyArnLmAQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-11 02:16:36,915:DEBUG:acme.client:Storing nonce: EPg6kJgqvIa9Dsgsfik3C0uglan0St2xf5oYjtsdY3vyArnLmAQ 2024-07-11 02:16:36,915:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-11 02:16:36,921:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3F2SWE5RHNnc2ZpazNDMHVnbGFuMFN0MnhmNW9ZanRzZFkzdnlBcm5MbUFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sGrH155LRTenS0iPJVss_En_mkj6NOOJGwuUuNybcWOlaelMa6IDwhaPD8m79SdBFgX8DoapEwmEgKOfArMC0z_iqfOg7GQQDPbz3N76fuCep0V8kIDoKOBogwLymAj_22fEcBqRKo-zlAw4cwYXgEED7IRoevI9mszXt3aufRYLDnUXC4gS-HmFvLgJvyBfwiG7nwsC58V9ixW0rj7P9Scv-ahRu5hMOhbNyyRW0wE985i1LdLW1p4juY4Ro6DVNfMfT9jxtHCpEC-uSf_HofywRwNWXqwoYWhXg1PUc1Yknf6a_Y-xSXbuwKgLyuSmYfyPlPJgPq18Rykqpd6tLg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-11 02:16:37,146:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-11 02:16:37,147:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 11 Jul 2024 00:16:34 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042772467 Replay-Nonce: EPg6kJgqSgGDbuGF4zbWxrVRCywC06qoBE_gcNexN_iHWXQdm2E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:59Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183661077" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042772467" } 2024-07-11 02:16:37,147:DEBUG:acme.client:Storing nonce: EPg6kJgqSgGDbuGF4zbWxrVRCywC06qoBE_gcNexN_iHWXQdm2E 2024-07-11 02:16:37,148:DEBUG:acme.client:JWS payload: b'' 2024-07-11 02:16:37,153:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183661077: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FTZ0dEYnVHRjR6Yld4clZSQ3l3QzA2cW9CRV9nY05leE5faUhXWFFkbTJFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM2NjEwNzcifQ", "signature": "GNQ6RkDrHEEXAnkMp9Y9EpNLSsWDMz9hDBd-g2KVp5JJ4YarggqfbM8svCqHncDTX7OWzpWS5PibRRSPAWzbeSja2_SMFJkimydPg6tRnl6xZ1vucNoALc8Z902kHRsqS0ibNyAOMP1Dln9joxCkRtE07fXaR7VqoeQ9JUc_jgO571gZCv6djmOcTDR8f7VpwVw16DnCe_HB6GIAsxBdtMjEK0MOLrnt7C4Q0JiaGwwRslyBv7pkWGuRfPmanilDu86PZBtNjfyCjTaR9ibH7FMFefkn98_T6nTawYvUP60M_LolDqGyzF_asVJesq3sv_Onn3DNksmGD377VjCp3A", "payload": "" } 2024-07-11 02:16:37,324:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183661077 HTTP/1.1" 200 805 2024-07-11 02:16:37,324:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 11 Jul 2024 00:16:34 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqX20j3RScFWc5LVyi0G38ugiCudTksL43CR0B4HjvTCU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/mMPmZA", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/oiTplA", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/6s0vLQ", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" } ] } 2024-07-11 02:16:37,325:DEBUG:acme.client:Storing nonce: EPg6kJgqX20j3RScFWc5LVyi0G38ugiCudTksL43CR0B4HjvTCU 2024-07-11 02:16:37,325:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-11 02:16:37,326:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-11 02:16:37,326:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-11 02:16:37,326:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-11 02:16:37,327:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:16:37,327:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-11 02:16:37,327:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-11 02:16:37,328:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-11 02:16:37,329:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-11 02:16:37,330:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-11 02:16:37,330:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-11 02:16:37,341:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-07-11 02:16:37,342:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)