2024-07-10 16:05:26,593:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-10 16:05:26,593:DEBUG:certbot._internal.main:Arguments: [] 2024-07-10 16:05:26,593:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-10 16:05:27,373:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-10 16:05:27,374:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-10 16:05:27,414:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-07-10 16:05:27,457:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:05:27,662:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:05:27,663:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-10 16:05:27,667:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-10 16:05:27,675:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-10 16:05:27,675:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:05:27,676:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:05:27,681:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:05:27,681:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:05:27,682:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:05:27,687:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:05:27,688:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:05:27,690:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:05:28,200:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:05:28,201:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:05:26 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jtlASHzE5jU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-10 16:05:28,203:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:05:33,754:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8331_key-certbot.pem 2024-07-10 16:05:38,608:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8329_csr-certbot.pem 2024-07-10 16:05:38,608:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:05:38,609:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:05:38,776:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:05:38,778:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:05:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-_VTFPvrccCB7SX9Bn1GQPlb9tWEL6Klc9umLz7MSs98 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:05:38,778:DEBUG:acme.client:Storing nonce: zgT1AlV-_VTFPvrccCB7SX9Bn1GQPlb9tWEL6Klc9umLz7MSs98 2024-07-10 16:05:38,778:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:05:38,785:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1fVlRGUHZyY2NDQjdTWDlCbjFHUVBsYjl0V0VMNktsYzl1bUx6N01Tczk4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "bl6oGzfNwzI0Kf_Dlrjc3zfWRItLU1I_qt7fu8pah53av5Xp1xXrkojcE1X-Lh65ejmPyVx0PWZys9QZ4lpABA_sZNWHs6-0cb2rtTn-Yw3Wiz8rRawccYHa2fHxJ-vq5_BYyPQOxzclhdxlfM8TYq9mZ9kE9C75SuZaJlaWqJoTKWiJ5qwaFTwB4RBDEJRtK-CoLcrDJW0P107MNxJpjchaZJz_naukXnmtfFbNDQBXp4LQAByZBUAXtdqdxnltt4PjYUh9SlgXKkyEyDRm4potl-Kb8pmiqi5Vo51zQdWmnEJ1_D0cGTl2NlHUnZ7xoqqvSGWH1NXDNcZYQilshw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-10 16:05:39,018:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-10 16:05:39,019:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:05:36 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042282867 Replay-Nonce: zgT1AlV-9JeM1BPLJ8C7fr2Xh4pLA3txS3cbMhKcICswNW6mTlw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:36Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182938057" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042282867" } 2024-07-10 16:05:39,020:DEBUG:acme.client:Storing nonce: zgT1AlV-9JeM1BPLJ8C7fr2Xh4pLA3txS3cbMhKcICswNW6mTlw 2024-07-10 16:05:39,020:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:05:39,028:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182938057: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi05SmVNMUJQTEo4QzdmcjJYaDRwTEEzdHhTM2NiTWhLY0lDc3dOVzZtVGx3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODI5MzgwNTcifQ", "signature": "WBeDF0uDYz9t5WZEgDLJcKQiacYAKT0UDjwMLWEyzmpwpNktx6G32Mt6zY11OBvKtsY8Ovjy8eDReNMyPqtdgVe6YqQ5gb3rNrshnmB5slL9-ivN-bHdaO_f_g2pfxqlC2DVS6JEsf2BJ4q3mZDBDNkmMgGQGdbI5K_rofeKHwrHoow3-uxR1m5VNPvBGPj-FukDGmOvOgtHD29wViMfMocQP17hnuIrMjukGt-bKNRHE3BA4xz7Fjdn2ikEeDrNJED3zV4vLBJWFVQyNG9w6b3tQGpCsCFxyskV55fGSf3P1SMg018avamtAKShBLsNApJPWjoVzH1QbYLTR4Y_Lg", "payload": "" } 2024-07-10 16:05:39,198:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375182938057 HTTP/1.1" 200 810 2024-07-10 16:05:39,199:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:05:37 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UwqkhVAE6A69gpcjJzA-0LGXmg6NipxVEIyIBaasOB3E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:36Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/gtbErw", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/uhlVRg", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182938057/KhzwYg", "status": "pending", "token": "ptDZYLNlOnZOi6qTjng3PTNQjSxQrDnR9zTE-8isP9g" } ] } 2024-07-10 16:05:39,200:DEBUG:acme.client:Storing nonce: eFSVlf8UwqkhVAE6A69gpcjJzA-0LGXmg6NipxVEIyIBaasOB3E 2024-07-10 16:05:39,201:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:05:39,202:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-10 16:05:39,203:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:05:39,203:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:05:39,217:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:05:39,217:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:05:39,217:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:05:39,218:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:05:39,223:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:05:39,263:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:05:39,464:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:05:39,465:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-10 16:05:39,466:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-10 16:05:39,473:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-10 16:05:39,473:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:05:39,473:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:05:39,478:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:05:39,478:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:05:39,479:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:05:39,483:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:05:39,484:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:05:39,486:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:05:39,993:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:05:39,993:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:05:37 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "vpAi6_m0DJY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-10 16:05:39,994:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:05:45,068:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8332_key-certbot.pem 2024-07-10 16:05:49,849:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8330_csr-certbot.pem 2024-07-10 16:05:49,850:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:05:49,850:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:05:50,016:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:05:50,017:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:05:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UJ7OXv3j3Q2F8PAKU82EGazZu1RpgTh2-MGFSCgfuQzA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:05:50,018:DEBUG:acme.client:Storing nonce: eFSVlf8UJ7OXv3j3Q2F8PAKU82EGazZu1RpgTh2-MGFSCgfuQzA 2024-07-10 16:05:50,018:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:05:50,030:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVKN09YdjNqM1EyRjhQQUtVODJFR2F6WnUxUnBnVGgyLU1HRlNDZ2Z1UXpBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "q1axrD4Dzg_HGPIQ_gziq6vY6clh5FFeIlEQ0Py_QZrk-FA-uw59NyYhlhpPi57gwCmYa4-mMz7HJxDOURa8VHvSsLycdl4gAnb4PueN9BpJ5AjinwxCoboES3fXffarf0ssrQBO9TO9IJ9ziuLZO1ABlq2Iv7EGnxn6Oz1j7lvH_sBXUCAJgsWHSGqp19_fLpBwVNPfQwMqyhjKAaSL_kJT239fCoWEx4YMF6mU4LSHg45l-ndI0QPHwbudxZxtpjQDSRg7w3C5PIo99Xp2UPrrmLxf8-NYrPRsorV2QIOexYOaSqKc7K-zwlEmS7mL7O2ErvmjfIp8XYPz8Ui_rg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-10 16:05:50,250:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-10 16:05:50,251:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:05:48 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042319787 Replay-Nonce: eFSVlf8UBloQ1yQP2zLlNFH4UmJVreRLHZMUQWtpJt5fWxfTNHk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:48Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182994777" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042319787" } 2024-07-10 16:05:50,252:DEBUG:acme.client:Storing nonce: eFSVlf8UBloQ1yQP2zLlNFH4UmJVreRLHZMUQWtpJt5fWxfTNHk 2024-07-10 16:05:50,252:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:05:50,259:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375182994777: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVCbG9RMXlRUDJ6TGxORkg0VW1KVnJlUkxIWk1VUVd0cEp0NWZXeGZUTkhrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODI5OTQ3NzcifQ", "signature": "McSK_OQw8EIQpNvIlFk1TOSueHwClr3Soq5SOkmO-vPFuHhhiHpWzf9GAOP355DoeaAexPFEOJ1xePF18Ig_DrDj1BFdeZy3RQwbeSUoaRUWQWwbeGtm8yoUitCM58Yj__i8OCxzSNuN_H-8WY6MhEodWZ4UM0dduitdJEG2cJPY1-XpCrzNbZCeZyxV_o2zMst5RSJIHqLrICi7ssQVsQyrdjAGQrFVQPmDQOW3HehXSgEiusUKmxUPaC1dvM-JbMVX5cquJaz-dEoS6y-r6FBvLQIToL3FIp6Fx0BqpMCfCTBLxaRonvDbiHdsy_ZzjsA8YkR7u0cqIXnmmCvEJg", "payload": "" } 2024-07-10 16:05:50,441:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375182994777 HTTP/1.1" 200 804 2024-07-10 16:05:50,441:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:05:48 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8U3Yrlev0iSE3o8x2fGw7468L9D_uvLfGHzuF5PmKxGxc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:48Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/Qwv2DQ", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/7TjcFQ", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375182994777/hJdTTw", "status": "pending", "token": "lDkopByYusrRshx0V-hbNiGqKdkGM__VDUEZOBYCZjg" } ] } 2024-07-10 16:05:50,442:DEBUG:acme.client:Storing nonce: eFSVlf8U3Yrlev0iSE3o8x2fGw7468L9D_uvLfGHzuF5PmKxGxc 2024-07-10 16:05:50,442:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:05:50,442:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-10 16:05:50,443:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:05:50,443:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:05:50,444:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:05:50,444:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:05:50,444:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:05:50,445:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:05:50,446:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:05:50,486:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:05:50,667:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:05:50,668:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-10 16:05:50,669:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-10 16:05:50,673:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-10 16:05:50,673:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:05:50,674:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:05:50,678:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:05:50,679:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:05:50,679:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:05:50,683:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:05:50,684:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:05:50,686:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:05:51,125:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:05:51,126:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:05:49 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TH_9TVFeE0E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-10 16:05:51,126:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:05:55,919:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8333_key-certbot.pem 2024-07-10 16:06:00,741:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8331_csr-certbot.pem 2024-07-10 16:06:00,742:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:06:00,742:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:06:00,887:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:06:00,888:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:05:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6MrwEphsi9Mh3EYz1JBNCk68B7pUL-6bVJL51NZNoJy4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:06:00,888:DEBUG:acme.client:Storing nonce: oPjXeLW6MrwEphsi9Mh3EYz1JBNCk68B7pUL-6bVJL51NZNoJy4 2024-07-10 16:06:00,888:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:06:00,895:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZNcndFcGhzaTlNaDNFWXoxSkJOQ2s2OEI3cFVMLTZiVkpMNTFOWk5vSnk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "m4hQ8RLIIoiQxdLsrbmcrbmKKtf3OGMTfqfSNG482SLB-7YdYtfqxne2rirEhXPwApJJFKzwIDdVn4tX-0TcovuWos9r0vwgViYEn3s2YmPpcKf60K--wGNNLCsnj-m-3RgNnrDrUSx0OTlnEok-UXNCORxgCZg2_8GnnkWJFPGhwnjMeaDEp32I8USInGybMlUf0t3aw9YAhku-DgFKlIBmcgYP6EX0SA5YiGBWCdwnuBug1oLKz_1t7IBYNH2pefKb0ykfSiKhRv5Ab-BtgglA0wVjvHxcuXh8PeycCQRSnP9xxQllVuYgSsE3hRv8TJiCO-J41X1JR1voofsIxg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-10 16:06:01,202:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-10 16:06:01,203:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:05:59 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042354327 Replay-Nonce: EPg6kJgq_XqmD1KNVITDgCT2AFS6yIqQc_Z59P7WDxhTKtuxPKs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:05:59Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183044847" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042354327" } 2024-07-10 16:06:01,204:DEBUG:acme.client:Storing nonce: EPg6kJgq_XqmD1KNVITDgCT2AFS6yIqQc_Z59P7WDxhTKtuxPKs 2024-07-10 16:06:01,205:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:06:01,218:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183044847: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FfWHFtRDFLTlZJVERnQ1QyQUZTNnlJcVFjX1o1OVA3V0R4aFRLdHV4UEtzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMwNDQ4NDcifQ", "signature": "Gf4Tc5C11GzeUoWXp3ZqBncMDsd8Ac-vzU9AimhcYv0ueTWlevKvks1JN7Prn4dZDWeNIgno0sdrQQeo2IIE98a8JQ-WI_uTVlzIIREGvEgeS5x0zaNt1qNvPEnN6hOPMEtD9nt1HJxBLLw30DQGzZK9r1p6dn8HnKALsUxv-TWUz9dOg65POVekn2pV0ey0d3FE2Ep9HbYT9-m2Zya9ybRjg091LdYejjUBPktxe10Us5mHknkCfgxstYuroe7MQ3AbW2ZClo1FfMagvmEqEHGZ1WSNA38x-6c4RD1rArVY1ShufBvd1ivZv2O4j8Wmr2rdG0L5098bXuydGnVACg", "payload": "" } 2024-07-10 16:06:01,380:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183044847 HTTP/1.1" 200 807 2024-07-10 16:06:01,382:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:05:59 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqzrpnnw7yNrjbZ-t7bG6Iqd13YgG3HD0rL20622WHdcs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:05:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/MqkCfA", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/OGQ48g", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183044847/eU6s8Q", "status": "pending", "token": "fSs2uG3VB2Gm7CKQrz_Ssx7VTUdlrzLBVTWpxf4Zl4Q" } ] } 2024-07-10 16:06:01,382:DEBUG:acme.client:Storing nonce: EPg6kJgqzrpnnw7yNrjbZ-t7bG6Iqd13YgG3HD0rL20622WHdcs 2024-07-10 16:06:01,383:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:06:01,384:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-10 16:06:01,385:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:06:01,385:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:06:01,387:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:06:01,387:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:06:01,387:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:06:01,388:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:06:01,390:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:06:01,443:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:06:01,661:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:06:01,664:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-10 16:06:01,665:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-10 16:06:01,671:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-10 16:06:01,671:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:06:01,671:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:06:01,676:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:06:01,677:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:06:01,677:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:06:01,681:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:06:01,682:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:06:01,684:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:06:02,122:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:06:02,124:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:00 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NDjKu6uuA-8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-10 16:06:02,125:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:06:07,134:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8334_key-certbot.pem 2024-07-10 16:06:11,831:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8332_csr-certbot.pem 2024-07-10 16:06:11,832:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:06:11,832:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:06:11,978:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:06:11,979:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqtgfcUdqi_p7vk0AqctlvmcWDsC4prmdAxNajWFERpUk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:06:11,979:DEBUG:acme.client:Storing nonce: EPg6kJgqtgfcUdqi_p7vk0AqctlvmcWDsC4prmdAxNajWFERpUk 2024-07-10 16:06:11,980:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:06:11,990:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3F0Z2ZjVWRxaV9wN3ZrMEFxY3Rsdm1jV0RzQzRwcm1kQXhOYWpXRkVScFVrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "rLZpvsd0QZqlN_SMt-1-XjeFY_tEfsgxgByiuZUGKvbAuRisoGmeHClDwCJuxpYosgdyJ8OZbajiRONwPdKBMCcqTzfGvLEAZG0t36kKLu7Enu6nhrmlkeOGRpRqWWxkUy-FpJiQUFcURhzrz5tRCvGe4D1Mxt14-IVE8LPwEQ5ZE_2Mw7qd8eDCg6SMv3FwRnZNVmhoOYzMZwfzvlv4jn9ngv8oScy0UVMWurswNP6HSPLvvCW9K8YeEu654f9ZcUaoRx12RA-nmU1hj-z2ZIvGIDV65MvHqZgvLyC_X960k13lrxuge-6TISMiLqqvibudzOlaGCR4DiKOJpBdww", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-10 16:06:12,269:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-10 16:06:12,270:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:06:10 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042400737 Replay-Nonce: oPjXeLW64pGT1s0Ba4qMpAGgNPsMbDAXl6CEvaqQoZUVMZw96Yo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:10Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183108237" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042400737" } 2024-07-10 16:06:12,270:DEBUG:acme.client:Storing nonce: oPjXeLW64pGT1s0Ba4qMpAGgNPsMbDAXl6CEvaqQoZUVMZw96Yo 2024-07-10 16:06:12,270:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:06:12,276:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183108237: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzY0cEdUMXMwQmE0cU1wQUdnTlBzTWJEQVhsNkNFdmFxUW9aVVZNWnc5NllvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMxMDgyMzcifQ", "signature": "J4BLsVqf9bLyelEMbkuHlC-N39R0azoYya8ccDwBpMsObViJwG2GSbxjc9DoaoFoZAg9g2EK9HmdjZXML7jUhzMklsL6RPPaAeVGR0p7pkXOQ_W6BF5pwt0uPol44lQPJZNdSWWUlpLjQU4esxNjGhiuxSzQcyOO3DxF6vrJiIqMh1pMh4bv4TescBYLPBEQVxvm_3aOinay26guJOozxXBsL1v2HffmX90EQl-DKoIii3MOrHXmKed3nDyGsE2hlghtt-noO8MYjmhTiv-K1zwiLnBPDGZkVrIpu_KCoy8WTNlViAkEOLn48vueKL2YISJJLGxgLhZ3svRDsRHaSA", "payload": "" } 2024-07-10 16:06:12,426:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183108237 HTTP/1.1" 200 801 2024-07-10 16:06:12,427:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:10 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6ei9L0QmVn3smoN0tjYiUsp3aj6IEuYjNmHJPlWWQIwQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:10Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/2jPgJg", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/MtdTdg", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183108237/1H2g1Q", "status": "pending", "token": "anH7f8_0PYm7Pisdc2nwW0DSqkGp-kIJhhX8lh1e8gk" } ] } 2024-07-10 16:06:12,428:DEBUG:acme.client:Storing nonce: oPjXeLW6ei9L0QmVn3smoN0tjYiUsp3aj6IEuYjNmHJPlWWQIwQ 2024-07-10 16:06:12,429:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:06:12,430:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-10 16:06:12,430:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:06:12,431:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:06:12,432:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:06:12,433:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:06:12,433:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:06:12,434:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:06:12,436:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:06:12,480:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:06:12,700:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:06:12,702:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-10 16:06:12,702:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-10 16:06:12,707:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-10 16:06:12,707:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:06:12,707:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:06:12,713:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:06:12,713:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:06:12,714:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:06:12,732:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:06:12,734:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:06:12,738:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:06:13,228:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:06:13,229:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:11 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WbEh3R6DIrE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-10 16:06:13,230:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:06:18,219:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8335_key-certbot.pem 2024-07-10 16:06:22,946:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8333_csr-certbot.pem 2024-07-10 16:06:22,947:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:06:22,947:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:06:23,114:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:06:23,114:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-5S3S4r7jgGez4AO0FRfgWFpGatgnAnqNaH0Wn80a9Og X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:06:23,115:DEBUG:acme.client:Storing nonce: zgT1AlV-5S3S4r7jgGez4AO0FRfgWFpGatgnAnqNaH0Wn80a9Og 2024-07-10 16:06:23,115:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:06:23,121:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi01UzNTNHI3amdHZXo0QU8wRlJmZ1dGcEdhdGduQW5xTmFIMFduODBhOU9nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qfisXEItG-lM--YrjKsOPC6AAlykGJynEICUaRMSs7310nNf0TR1Jdl4Cj7NuPhYBXvVcGvxlve_HEkinQzZRTY4AiefGPf5ZxLC56pYX_iEpp7mR2-7Sckqn7eDTjxMynW9K18Z2__oFjQh5fDjG77ESkM7Rj_bvqXFD3vNS0Y0g4H-8zwgK1j-aac7kobBaAAd8ahyzYT3JzTxrjchjaEZd2-LaDnwqpv2gF_yzNY-FauumBsgRVsW3nwTKeAr7WY1aTCnJct-guEBNmAZM2lzlMfsAGio-k2ydz0TiTMWUaVelIgBDR2EUQmHP5hE4m5IzcdVCDMBVDq7Xb7Mmw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-10 16:06:23,369:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-10 16:06:23,372:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:06:21 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042441707 Replay-Nonce: zgT1AlV-3YtdYihM8XmYP-A_o3IRIgTQZ4HKfs_Ld-bxVUvCjVw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:21Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183170507" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042441707" } 2024-07-10 16:06:23,372:DEBUG:acme.client:Storing nonce: zgT1AlV-3YtdYihM8XmYP-A_o3IRIgTQZ4HKfs_Ld-bxVUvCjVw 2024-07-10 16:06:23,373:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:06:23,379:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183170507: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi0zWXRkWWloTThYbVlQLUFfbzNJUklnVFFaNEhLZnNfTGQtYnhWVXZDalZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMxNzA1MDcifQ", "signature": "EwvobvfE7GPCSEr8MSjBzRaOe0ELlt_NMPOvKCldWF49VIlfPCL0BtUP4QxpD6NfvN3NK2Ez74KZsMqzx8QPHLwjEVWWKcjhK2yNeYD8ElJK9vhR-zSIEOD1SM42Q-EB3CIS7HnvmWxTcmkdn4e1lsy1dSgZwNR4SpTlgIoJIEwxE6rJFZjTX92NfpjXMHs1Brc2rB2eFB2PkEAKd3wkLcy1ggnWFJTLvWzL-b2UzGS-IvqDxyGikdvLEeA5BrRjStpas0mZ9L8ZHwpTr_lr-cqbLLJJ2jFPo5oXNrVYoQ5Z5gzxtu2Gz9PJ6QkfSSUav7qN1xggicFtbLJK6TIHXQ", "payload": "" } 2024-07-10 16:06:23,544:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183170507 HTTP/1.1" 200 805 2024-07-10 16:06:23,545:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:21 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8ULkjHtQNeoLiTPl5TkPb0SKWZwNPzHKf7k6ZPZegbDeM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/LCB2Ww", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/I9mxAw", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183170507/UAlFYQ", "status": "pending", "token": "X_E3PzEdjrH23xGZdIfwyHBHHmA9nVT4QfSUNKySQac" } ] } 2024-07-10 16:06:23,545:DEBUG:acme.client:Storing nonce: eFSVlf8ULkjHtQNeoLiTPl5TkPb0SKWZwNPzHKf7k6ZPZegbDeM 2024-07-10 16:06:23,545:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:06:23,546:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-10 16:06:23,546:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:06:23,547:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:06:23,548:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:06:23,548:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:06:23,548:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:06:23,549:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:06:23,550:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:06:23,598:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:06:23,801:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:06:23,804:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-10 16:06:23,805:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-10 16:06:23,813:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-10 16:06:23,813:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:06:23,814:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:06:23,825:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:06:23,825:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:06:23,825:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:06:23,829:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:06:23,830:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:06:23,832:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:06:24,323:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:06:24,323:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:22 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "n_TrNxNXbPc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-10 16:06:24,324:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:06:29,367:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8336_key-certbot.pem 2024-07-10 16:06:34,173:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8334_csr-certbot.pem 2024-07-10 16:06:34,173:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:06:34,173:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:06:34,336:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:06:34,338:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-ECD9dOaO0hAcfULEl-PRMLEyetteNLp3BFaOfIj6sK0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:06:34,338:DEBUG:acme.client:Storing nonce: zgT1AlV-ECD9dOaO0hAcfULEl-PRMLEyetteNLp3BFaOfIj6sK0 2024-07-10 16:06:34,339:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:06:34,345:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1FQ0Q5ZE9hTzBoQWNmVUxFbC1QUk1MRXlldHRlTkxwM0JGYU9mSWo2c0swIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HRVIhwYSVHxx5baYGHSKwWViV1htQxRSkdub-q_VEWqzUXIFctQSrDOgyV50BwCiNq6xcbH4ZBAocfqa0WT0_UbZR7DBnh4_4l2EI5FX_CSsXOjxltG-DT-mCuzfAbxZHZAyLxmwyL8-LwaZPKLW_wd5GCTJEU4M8QIVjhT0ki2cyafZHNfRG1LP-JSZ-kxcbOY6aut1CIMdvl8DkDJrUt-RkMMx6xwkK7USJp9XO-Da-EwGX8bNzAdmG33Yo4UXqjUFWGeKGY0BrWt-kgvWLbL0AcOw_mxHaEo91J_IY1SZ07H7lRb-uUewEPN0wi1hWffMVYYQ8N7aO3cVCHsKsA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-10 16:06:34,554:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-10 16:06:34,555:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:06:32 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042480887 Replay-Nonce: zgT1AlV-0jWDeJ1pCmuARUkHbh-q9aBX4W2uXEuNckExGJbq5Zc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:32Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183227457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042480887" } 2024-07-10 16:06:34,555:DEBUG:acme.client:Storing nonce: zgT1AlV-0jWDeJ1pCmuARUkHbh-q9aBX4W2uXEuNckExGJbq5Zc 2024-07-10 16:06:34,555:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:06:34,561:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183227457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi0waldEZUoxcENtdUFSVWtIYmgtcTlhQlg0VzJ1WEV1TmNrRXhHSmJxNVpjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMyMjc0NTcifQ", "signature": "uWu0WQiJAqlrwzp0HSbc8SzRA26ByFKm52bqm1FUpiByrVkHH5LfpXTFTJAcAkKqpjl187MiNNK7buzZOFhshek8Asv0K9XR_Yl7h9pZia_WmS8mfmO894Z80MOx86bLg5YKrkp6CE2_IU-ze_wIFARQ8o9Dlfsiy8xNV_CTZYsyW0YuMp6WEyILcb01axNEwbZIfPDEz3FBgKeYHG64hgJ7n6G_cXTmeKdCNEg60t2AtXh2d16jrraTRpXPRjfoLIoN1iz9b3yG27cwH9vN6ZLrtNKfzoIkQ1hNrJ_eAjIuY1O9lhMos-jzUu3BRVyKL0sEfA4Vj2YnNNbwKE9H0g", "payload": "" } 2024-07-10 16:06:34,726:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183227457 HTTP/1.1" 200 809 2024-07-10 16:06:34,727:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:32 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UrQsoeRj5WRd5NFxUs5kVgt6tyAu_rrN4529pfyMuNPs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/Us5Z1g", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/XssHxw", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183227457/UVYPXQ", "status": "pending", "token": "FhidJ9HR9z8Cnq7xpYKzgoBfFYE2R1QO3vWYBZ0DBVg" } ] } 2024-07-10 16:06:34,728:DEBUG:acme.client:Storing nonce: eFSVlf8UrQsoeRj5WRd5NFxUs5kVgt6tyAu_rrN4529pfyMuNPs 2024-07-10 16:06:34,728:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:06:34,729:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-10 16:06:34,729:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:06:34,730:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:06:34,730:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:06:34,731:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:06:34,731:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:06:34,731:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:06:34,732:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:06:34,776:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:06:34,969:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:06:34,971:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-10 16:06:34,973:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-10 16:06:34,981:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-08-06 23:03:56 UTC. 2024-07-10 16:06:34,981:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:06:34,982:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:06:34,993:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:06:34,994:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:06:34,994:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:06:35,014:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:06:35,015:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:06:35,017:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:06:35,517:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:06:35,517:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:33 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "i9gLI1WdKDI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-10 16:06:35,518:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:06:40,361:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8337_key-certbot.pem 2024-07-10 16:06:45,107:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8335_csr-certbot.pem 2024-07-10 16:06:45,108:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:06:45,108:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:06:45,274:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:06:45,274:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:43 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-TMQwZb0qDjmXXgPXAD9U33rxcCyDentXa3g02NR6lN4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:06:45,275:DEBUG:acme.client:Storing nonce: zgT1AlV-TMQwZb0qDjmXXgPXAD9U33rxcCyDentXa3g02NR6lN4 2024-07-10 16:06:45,275:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:06:45,281:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1UTVF3WmIwcURqbVhYZ1BYQUQ5VTMzcnhjQ3lEZW50WGEzZzAyTlI2bE40IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cB6fKVhkmr5OcpX7oVqyaiEQuSf75FRqTl8Gba-AKhZKN-jkG-qIqgb8oqaorgNwcYUwxixKBMa-oShEpsadLOUEnS8cLIfcsEip4u5fkawbx_Gh65r61NV-bElsEI9lpVZqnOZOJ_dCJTyvJo3Rke16PdhPDrX6kKUd_DBl6Pu-kTxuPYNkK2Zu95-Y1DVzRUQNWFMgDB26pe8294atrvlz1EGVfa6NefkkF8GHeejDWXDE5d85L-0EOQYWr2nymnnlZmcbTSEvbE5aXLrPSjLmYCMBFWOhXrj6YriPc-fXKmJRP7O040IBJoW8vwTT6thwEP19SDNAf839aELqMg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-10 16:06:45,474:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-10 16:06:45,474:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:06:43 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/285341919627 Replay-Nonce: zgT1AlV-0uKHze9lUc2QOilgC82C5gLoM4tt9RBo66ojckuat3g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-15T04:13:07Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/285341919627" } 2024-07-10 16:06:45,475:DEBUG:acme.client:Storing nonce: zgT1AlV-0uKHze9lUc2QOilgC82C5gLoM4tt9RBo66ojckuat3g 2024-07-10 16:06:45,475:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:06:45,482:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi0wdUtIemU5bFVjMlFPaWxnQzgyQzVnTG9NNHR0OVJCbzY2b2pja3VhdDNnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzQxNTAyMDI0NDcifQ", "signature": "KoIuxcG57-v1lUHdLB2P_BhwBnwoNwb-eamfAn-tAb6MuAqKTQ8DRDQ3RFKOLAR19EmeZLK8JUfB_ptZR8l3ND4tyfkltqgB-IGRkDJ6_uqTcIGIDxGplL5WWE4hX4PkTb2XhF0JRtGV7Gmy5_cetbBgZaA4fmFqM10g5d3Yay7FPipTtkOVwHpZPrH9zmVl76arixyr8AzARv_pH89dttIm98lQjKx_UTzuRV5OoPgSpgb_7JkpDGXJiW7CfljVt97hlf5J8upDg6xXk4HYoxk-qsB9eR8UuaOg4I_b5pCelcGpKyBgzcDtGmMotbk55ZnxPUxfDXDeckj0Jl7S2A", "payload": "" } 2024-07-10 16:06:45,652:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/374150202447 HTTP/1.1" 200 807 2024-07-10 16:06:45,653:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:43 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-YzJub7Evh05wNdSJxGPbcsiOnTD7O262MgUzJb7aAMw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-15T04:13:07Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/NY8rUA", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/R0qBhg", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/2vSv0A", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" } ] } 2024-07-10 16:06:45,653:DEBUG:acme.client:Storing nonce: zgT1AlV-YzJub7Evh05wNdSJxGPbcsiOnTD7O262MgUzJb7aAMw 2024-07-10 16:06:45,654:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:06:45,655:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-07-10 16:06:45,655:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:06:45,655:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:06:45,656:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:06:45,656:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:06:45,657:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:06:45,657:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:06:45,658:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:06:45,708:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:06:45,939:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:06:45,941:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-10 16:06:45,942:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-10 16:06:45,947:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-10 16:06:45,947:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:06:45,948:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:06:45,953:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:06:45,954:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:06:45,954:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:06:45,969:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:06:45,970:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:06:45,972:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:06:46,421:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:06:46,422:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:44 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "kIzhTOifCXE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-10 16:06:46,423:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:06:51,526:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8338_key-certbot.pem 2024-07-10 16:06:56,254:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8336_csr-certbot.pem 2024-07-10 16:06:56,254:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:06:56,254:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:06:56,404:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:06:56,405:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6LHnm60C4l_3VqhHBs9TlYZPG5ut-1YQwX08yVdvmH_Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:06:56,406:DEBUG:acme.client:Storing nonce: oPjXeLW6LHnm60C4l_3VqhHBs9TlYZPG5ut-1YQwX08yVdvmH_Q 2024-07-10 16:06:56,406:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:06:56,418:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZMSG5tNjBDNGxfM1ZxaEhCczlUbFlaUEc1dXQtMVlRd1gwOHlWZHZtSF9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PIf5xTXYF_vD9dB1St418fAPphfJaJuqTsM-pRXYZGflF3GdpcHkxB5O6ilC7kUw9y-cwzqSGhuWzgAZspkhB3X7jFqVGEN4043o-HbCnZZy3k_NoTYurD1RHev2txmAJwNoxgDAp8UBN3SUIybAI23BdXrn59zFmOTisY5EzdUvp76a924VuoIbUUGLiIM1xzIwD4IHteJgzSM9Z4Y5FMPfFqpjDUj5sOdM87UGdmIJx8UMHVHXNsbGYb0fHO2KLi_AN3qezcwyyicsdRDZlWK2nwiBw85xyP6qEJY58gHibNQop0aZwmSeA_nrqFOWGx5-Bekhz09EmRFzyGtmAA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-10 16:06:56,713:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-10 16:06:56,714:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:06:54 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042554147 Replay-Nonce: EPg6kJgqYCrcY7C4jt0WE7AXRWzAPCQQdzw12zqZAxjEEd42vRY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:06:54Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183336527" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042554147" } 2024-07-10 16:06:56,714:DEBUG:acme.client:Storing nonce: EPg6kJgqYCrcY7C4jt0WE7AXRWzAPCQQdzw12zqZAxjEEd42vRY 2024-07-10 16:06:56,714:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:06:56,721:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183336527: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FZQ3JjWTdDNGp0MFdFN0FYUld6QVBDUVFkencxMnpxWkF4akVFZDQydlJZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMzMzY1MjcifQ", "signature": "iXhifpgoyc1DJtSHB2qEePbmIwuhuw2cXirEPGGflDLv3OcZC-UIX9wwI-uADqdQUjbQnlSBsrcs5zEou30z0SllJbp5rUEfU2Vqy7lqMMUs1QwUhW9h7B5p-6f0JIltFFSKUUl-TXkKSLg1j1zXSQEH_jFIbp1ghR1f1fEhFZXA7Wo1IOv95Sxkfy8TxzUxSHNQMMWhkh827ThCiDw-JOXGmX2xS_fmRXxWJTIIuW9GBC3GqJ6NDXxa795Mjg9Rh-OLy5E9f5ruUR8f868bfqB1FQWIPOwEJJGsZnEX0WecyJdBOzgU7N-UYovaxuxBzo_2TVYb4Soh6ahpr48S6g", "payload": "" } 2024-07-10 16:06:56,887:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183336527 HTTP/1.1" 200 806 2024-07-10 16:06:56,889:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:54 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6D5nioCL8esXuFRCmj3B_G0pL8j9LsYlBpkUx4jJnz14 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:06:54Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/LtvPaA", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/uTcC3A", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183336527/tbjSgg", "status": "pending", "token": "LCn_Dg9keWd4rsuKuqKNVIA2JtT0vgefr1hxywuntyM" } ] } 2024-07-10 16:06:56,889:DEBUG:acme.client:Storing nonce: oPjXeLW6D5nioCL8esXuFRCmj3B_G0pL8j9LsYlBpkUx4jJnz14 2024-07-10 16:06:56,890:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:06:56,891:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-10 16:06:56,892:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:06:56,893:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:06:56,894:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:06:56,894:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:06:56,895:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:06:56,895:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:06:56,897:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:06:56,976:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-10 16:06:56,976:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:06:56,977:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-10 16:06:56,984:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-10 16:06:56,986:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-10 16:06:56,986:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-10 16:06:56,986:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-10 16:06:56,987:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-10 16:06:56,989:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-10 16:06:57,031:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:06:57,242:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:06:57,244:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-10 16:06:57,245:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-10 16:06:57,249:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-10 16:06:57,250:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:06:57,250:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:06:57,256:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:06:57,256:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:06:57,257:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:06:57,274:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:06:57,274:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:06:57,276:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:06:57,767:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:06:57,768:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:06:55 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "T8TkAXTadHg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-10 16:06:57,769:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:07:02,724:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8339_key-certbot.pem 2024-07-10 16:07:07,384:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8337_csr-certbot.pem 2024-07-10 16:07:07,385:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:07:07,385:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:07:07,547:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:07:07,548:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:05 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-nf7W1vLlD-skolCNxX8SyVZKwnzSUfL7OFuCKSuay8k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:07:07,548:DEBUG:acme.client:Storing nonce: zgT1AlV-nf7W1vLlD-skolCNxX8SyVZKwnzSUfL7OFuCKSuay8k 2024-07-10 16:07:07,548:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:07:07,554:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1uZjdXMXZMbEQtc2tvbENOeFg4U3lWWkt3bnpTVWZMN09GdUNLU3VheThrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Sd87GI-0KMSX1b_W7DcetjPLRxUak84hmY0szvWxE-mGqPVXmlsRCHdhjUT2G8RXbHqdSVfgRK-aii7iIZ5aUvWpR_s3MdracvFnhOe7PZnR4fsQnDMu-C8fKBKqOGAy4-_6AtM8HWrLo-J4XFTfM6zyLN8NXVLiQoXNjFctqNLq_eDQOsGzdcH8LNPfxxxbczU2Ob0DWFg5Gsfo1CI_-pu46cg8HDP5tzILOmAt1EwXKqzg938DDS6qX9uJ-zJ6nixKEJRe63Wv9cu3ka0SrhAKpHp91IC_m0mVEM_n38Qm3rYoFFEzf0jWpbbCDdC8-YKjoHf84xvinGWBhj49Jg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-10 16:07:07,772:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-10 16:07:07,773:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:07:05 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042595287 Replay-Nonce: eFSVlf8UbS6UpSvfWTwORoeNtExt64ZaxntpIWsJXe4vRwIFYSw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:05Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183394907" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042595287" } 2024-07-10 16:07:07,774:DEBUG:acme.client:Storing nonce: eFSVlf8UbS6UpSvfWTwORoeNtExt64ZaxntpIWsJXe4vRwIFYSw 2024-07-10 16:07:07,775:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:07:07,784:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183394907: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFViUzZVcFN2ZldUd09Sb2VOdEV4dDY0WmF4bnRwSVdzSlhlNHZSd0lGWVN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODMzOTQ5MDcifQ", "signature": "cacaaKB7tNS16gtqHukILs4EQLXJk0XlOfFRcLQc7IOxy92lUZSEujiglTFdXlmgW7m2M_25mGfaDWTEJKhZ1njOTX1zARc6TMDsCbjerc0AzF_ZMJ1ILDyGi4gyoSPIFyRSnPH5CoWPVL_sgF95aB1lAaTj_18ff8NBpDoEw6O3xkz4018EoLw-r1FrkBDLdaCEziHybUZ2hNRGKCaorL4kaeHS3-VauaPF-4BfUiv5p4AkffUvIr79IuydKlz1ymNTPLnGJgIGcujmEtDnHEJztxl-u_Jh3nwVbucwi73PW7Rug4TvaZ3jMvWlu_pn2SLeE5LFQMZYcHjYE0SPhg", "payload": "" } 2024-07-10 16:07:07,950:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183394907 HTTP/1.1" 200 811 2024-07-10 16:07:07,951:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:05 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-wM8PjSjOYJtKq_C1qNlx8SU9cLaHmfZJyFi3-vx0YUY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:05Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/78vQQw", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/p4w28w", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183394907/j5xMwg", "status": "pending", "token": "a1BJ5kAY_S86uqPb7UYZwOBmd-p0sSaUFstOAnYa_I0" } ] } 2024-07-10 16:07:07,952:DEBUG:acme.client:Storing nonce: zgT1AlV-wM8PjSjOYJtKq_C1qNlx8SU9cLaHmfZJyFi3-vx0YUY 2024-07-10 16:07:07,953:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:07:07,953:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-10 16:07:07,954:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:07:07,955:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:07:07,955:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:07:07,956:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:07:07,956:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:07:07,956:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:07:07,957:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:07:08,006:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:07:08,240:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:07:08,241:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-10 16:07:08,242:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-10 16:07:08,247:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-10 16:07:08,247:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:07:08,247:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:07:08,252:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:07:08,252:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:07:08,252:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:07:08,267:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:07:08,268:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:07:08,270:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:07:08,714:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:07:08,715:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:06 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FN6lZApUm9M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-10 16:07:08,715:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:07:13,693:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8340_key-certbot.pem 2024-07-10 16:07:18,268:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8338_csr-certbot.pem 2024-07-10 16:07:18,268:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:07:18,269:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:07:18,418:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:07:18,419:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqd6SuqjSe0u6A5gzbSA062QUl3YKyxS_f2GYzq1zdVSc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:07:18,420:DEBUG:acme.client:Storing nonce: EPg6kJgqd6SuqjSe0u6A5gzbSA062QUl3YKyxS_f2GYzq1zdVSc 2024-07-10 16:07:18,420:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:07:18,427:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FkNlN1cWpTZTB1NkE1Z3piU0EwNjJRVWwzWUt5eFNfZjJHWXpxMXpkVlNjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nh2-s0SGr-q93B-ugyc4r_UEFVcFYkfww1636wATNInwgcW2mXZptx2q6gww0RJkwfjt05au-7BV8falno2c9UoFdJ9D-V2K2NKORbzt9z7gxErIloueQsMhu3uoOcpZksaK5q0tpQ8U-3mjSLact1Jfgm24UWNIQ9htNuhGgulR8mkun1W1wspWWAzq5UxUul9MebhotiFcGt1DL_dkzcW1i5ksRY9cN1MRXNFDQMJjRzji_20jlP0MlDN1AUH863Nq66g92m6ZazYNJ9q5nWYuyMcYiS_7brrWGlPlzm3wlWipl2n0zJ9UTFz34g2PC44UGjMa6wu4jR5hOc_jfg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-10 16:07:18,744:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-10 16:07:18,746:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:07:16 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042636517 Replay-Nonce: oPjXeLW6gw7jGl8nZJXrvYQnWP8YNpmaR6idIlLalNHtf1iPfd8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183457817" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042636517" } 2024-07-10 16:07:18,747:DEBUG:acme.client:Storing nonce: oPjXeLW6gw7jGl8nZJXrvYQnWP8YNpmaR6idIlLalNHtf1iPfd8 2024-07-10 16:07:18,747:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:07:18,757:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183457817: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZndzdqR2w4blpKWHJ2WVFuV1A4WU5wbWFSNmlkSWxMYWxOSHRmMWlQZmQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM0NTc4MTcifQ", "signature": "KNR_u3icC9HSrN-QAqsQVjyF8hX97ooLzFO_LoxrYiCcBGDANTCgz3cSBxrDUg4CDG0NYAiXBSdBA8koIuRlXM0GdADN0ca2Gkk5YFW722aiIFsQLqAsZ-EPxUs09n0fWIqYJ8oT8nVU5Va1meeLV79TAdQA3-ZoWqhQKT0n3RcdOQ5CdY1oOJA-NhEWYIOiCVetlDx16DuMXS-ts7ZDgCuVvs0hEuIfc4Mjd0cHbOrW4jFBnMdWXKxKPJic2Vyd5Ixr08ROTfhJirWuejdpa6RGhDvpQRICJmy_GG9lFf_tAVmaY24uPCsFzRsYY5LKI_TtlXyHxh5Tt9jRhmU1Vg", "payload": "" } 2024-07-10 16:07:18,943:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183457817 HTTP/1.1" 200 810 2024-07-10 16:07:18,945:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:16 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6GZuprNuZsAvGiwMpuH_T_dUsf_ecu47mQmhAelvWTgY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/RejdSQ", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/r4Hc4w", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183457817/l3Nghg", "status": "pending", "token": "isaLNDZnxoSfGQjjXySASKXeNzFiXQqAXpFJBGn_ISs" } ] } 2024-07-10 16:07:18,945:DEBUG:acme.client:Storing nonce: oPjXeLW6GZuprNuZsAvGiwMpuH_T_dUsf_ecu47mQmhAelvWTgY 2024-07-10 16:07:18,946:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:07:18,947:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-10 16:07:18,947:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:07:18,948:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:07:18,948:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:07:18,949:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:07:18,949:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:07:18,949:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:07:18,952:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:07:19,004:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:07:19,213:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:07:19,216:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-10 16:07:19,217:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-10 16:07:19,221:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-10 16:07:19,221:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:07:19,222:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:07:19,227:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:07:19,227:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:07:19,227:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:07:19,231:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:07:19,232:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:07:19,234:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:07:19,677:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:07:19,678:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:17 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "PqyKK_nMAb0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-10 16:07:19,679:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:07:24,326:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8341_key-certbot.pem 2024-07-10 16:07:28,783:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8339_csr-certbot.pem 2024-07-10 16:07:28,784:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:07:28,784:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:07:28,929:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:07:28,930:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:26 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6QKhOzeA53wO2olgY95LL5BGgC_kane9jcO2wF92ukjo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:07:28,930:DEBUG:acme.client:Storing nonce: oPjXeLW6QKhOzeA53wO2olgY95LL5BGgC_kane9jcO2wF92ukjo 2024-07-10 16:07:28,931:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:07:28,940:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZRS2hPemVBNTN3TzJvbGdZOTVMTDVCR2dDX2thbmU5amNPMndGOTJ1a2pvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BGyOvmd_UpY0tpnJk8O9-kLW6vDL56WG6KLcrQM44pwMrRFx9JueNdpx55hrcRUXrADfOj0BYeKG2XqwzDWJFsohgtXAKouH25DA1CQ3D-3u2GH7swxaT5T4dZ1Db32_je437JOm4wh7k6MpZpGDnQUEdO5lFWCWmHS2Ou61wKHPkFoTW1Ucduu5xm5M7noiXQwD0TKqYdsOTsnVb8UoFUAeGMCSZotz7sq5jzDZAGPlkwSMD2SFZDu0nHdu8HcOpnQ6gGyjHcm_ppq2Go3v7yQscVrbbgh_pLd_Qyoq4wXMmvVu5632i0I6zCWzsY-ojHcYuQALHKKgMW2Axijdog", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-10 16:07:29,330:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-10 16:07:29,332:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:07:27 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042672187 Replay-Nonce: oPjXeLW6WX2wcprZAQoy6YT5b0AD_kfQE7wABarSX3aXfB0vI6M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:27Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183510157" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042672187" } 2024-07-10 16:07:29,332:DEBUG:acme.client:Storing nonce: oPjXeLW6WX2wcprZAQoy6YT5b0AD_kfQE7wABarSX3aXfB0vI6M 2024-07-10 16:07:29,333:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:07:29,344:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183510157: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZXWDJ3Y3ByWkFRb3k2WVQ1YjBBRF9rZlFFN3dBQmFyU1gzYVhmQjB2STZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM1MTAxNTcifQ", "signature": "NlsQaybh7_ezt4mTr0A4R37fvBekJ_F-Zk1e0EQ4OrjKpfffgTm4ytVI0Z28iQIepC77M_v56JMjVWJRG2dHRY0gyU-JvoNpOgBSg-JlYxSeGceMyh2ZX-_IMQCIQ_tHCjjmDDnaQKGyqOeqiSwBrqjbrju_sSyN5eP8181OtA4N3JLLe_C5BahVKl0hT5zOewH9je1oInMM1SoWQCVoR-nfjodSIsA-PITVvB1KugJQcqN4kLVDs1-IXZ8su5k5AHSjUs4Ad_7ZWm-DwVslmHkEr5TgLpnUHtQbQXxMNi9Yjn9kccBC4oYEGX8wn3kiXFf4neupVD6e_pxS_Y_1MA", "payload": "" } 2024-07-10 16:07:29,493:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183510157 HTTP/1.1" 200 809 2024-07-10 16:07:29,494:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:27 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6wZ4zQcRlBovRAYrPQyUEtS8o_EOzrIsWNM1TcjMWoAU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:27Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/9E6R1w", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/8v5Buw", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183510157/2WSNJg", "status": "pending", "token": "NTaFA8XzAkVI_F66Zx-HZuUcYNWBiVzaXopXsNQskLc" } ] } 2024-07-10 16:07:29,494:DEBUG:acme.client:Storing nonce: oPjXeLW6wZ4zQcRlBovRAYrPQyUEtS8o_EOzrIsWNM1TcjMWoAU 2024-07-10 16:07:29,494:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:07:29,495:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-10 16:07:29,495:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:07:29,496:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:07:29,496:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:07:29,497:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:07:29,497:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:07:29,497:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:07:29,498:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:07:29,542:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:07:29,816:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:07:29,819:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-10 16:07:29,820:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-10 16:07:29,825:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-10 16:07:29,825:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:07:29,826:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:07:29,831:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:07:29,831:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:07:29,831:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:07:29,835:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:07:29,836:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:07:29,838:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:07:30,349:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:07:30,350:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:28 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "sNY7uwhKGD0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-10 16:07:30,350:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:07:35,021:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8342_key-certbot.pem 2024-07-10 16:07:39,465:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8340_csr-certbot.pem 2024-07-10 16:07:39,466:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:07:39,466:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:07:39,632:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:07:39,633:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8Uif7031br4Y5b-rSHHIOQZfiz5LL2qG6pNNkQHF3gTu0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:07:39,633:DEBUG:acme.client:Storing nonce: eFSVlf8Uif7031br4Y5b-rSHHIOQZfiz5LL2qG6pNNkQHF3gTu0 2024-07-10 16:07:39,633:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:07:39,640:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVpZjcwMzFicjRZNWItclNISElPUVpmaXo1TEwycUc2cE5Oa1FIRjNnVHUwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BuJx1faZ2BdQshiu5zV4uTFKjovRu4JHZWRcOFe7GsLMgiPeFkQSx33TVEgFfkcaGIbdG-FkWsu4f5Bp_C3Xmo4jPEiQuQKgHFvoNqh2h72B1s_ftTxFUnpKX1dCIWOxg09s21inRl1EH7wuo28zKwCnrkW9UueGESfO1gpmW2H0RdyuEBG-gSbVBIxl52tiHtsMZG6_0yZBu3paDF_7EzRzRfqtJ8NfwPI0CBuZOXWxil7HlQIJ80Xggs7m6qQlJf5N2JgAkg3L8_K-pYiM2mXsKEv53BlsZVkOIKUz9ra07bScrcHvyiIYl2EhxyBU1w8nVdrbaYg8jfNHWlhA5A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-10 16:07:39,861:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-10 16:07:39,862:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:07:37 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042704307 Replay-Nonce: eFSVlf8URAjmLJUJACi_9Wy0f9I3YnRqnHj-l0OPHWJdgYM40IA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:37Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183559397" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042704307" } 2024-07-10 16:07:39,862:DEBUG:acme.client:Storing nonce: eFSVlf8URAjmLJUJACi_9Wy0f9I3YnRqnHj-l0OPHWJdgYM40IA 2024-07-10 16:07:39,863:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:07:39,874:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183559397: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVSQWptTEpVSkFDaV85V3kwZjlJM1luUnFuSGotbDBPUEhXSmRnWU00MElBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM1NTkzOTcifQ", "signature": "qpvjDM7hDu4rrDwP-5t_oAjgpgthifo7pHUbDrQV6eipVQqI29OAeUGxv37AK8sNkLeB0P7PH-szKyuuJsrRdDkJuiYwFBVJBYnlekJKZw4bokzTPP-qkd1Risy0QCVv2fLqpwXyDSjkxcfzlw78Fmip9eKum857okoRFYFZRU6A2yN4m2KQpJI1dW_x_ulv9kTKNPoA5ZnvM8ibE1cLDTl034FMuM8JRZ-opmrzUhmjwBS1bg_7JObZQGELaBITE60hMd7GRJu8613j3LrShWll0BExB6IBYIP8ua5vLuEi_rXGky83nbVJQvMl2ozOL7lroaYLGiAtNV2uFwlvrQ", "payload": "" } 2024-07-10 16:07:40,045:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183559397 HTTP/1.1" 200 805 2024-07-10 16:07:40,047:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:37 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UbQiRhQbQ0YwBzvEHMw1Fc6NUGLEXTADYpEFTLO8bL8c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:37Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/8Y1D2A", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/nFVVvA", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183559397/ITyESg", "status": "pending", "token": "E90OEFLh0vp0AKug7Psv73yirxKw-y-b5Dnti4cGsuQ" } ] } 2024-07-10 16:07:40,047:DEBUG:acme.client:Storing nonce: eFSVlf8UbQiRhQbQ0YwBzvEHMw1Fc6NUGLEXTADYpEFTLO8bL8c 2024-07-10 16:07:40,048:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:07:40,049:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-10 16:07:40,050:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:07:40,051:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:07:40,052:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:07:40,052:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:07:40,052:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:07:40,053:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:07:40,054:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:07:40,093:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:07:40,371:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:07:40,372:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-10 16:07:40,373:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-10 16:07:40,377:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-10 16:07:40,378:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:07:40,378:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:07:40,383:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:07:40,383:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:07:40,383:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:07:40,388:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:07:40,388:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:07:40,391:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:07:40,902:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:07:40,903:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:38 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1fS3momVr2k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-10 16:07:40,904:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:07:46,220:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8343_key-certbot.pem 2024-07-10 16:07:50,928:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8341_csr-certbot.pem 2024-07-10 16:07:50,928:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:07:50,929:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:07:51,095:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:07:51,096:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8Ut1ZTbnqDHbt2UIvAe3ZGzLo2SPNi8Kp2hXIbISrQ9Bk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:07:51,097:DEBUG:acme.client:Storing nonce: eFSVlf8Ut1ZTbnqDHbt2UIvAe3ZGzLo2SPNi8Kp2hXIbISrQ9Bk 2024-07-10 16:07:51,097:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:07:51,109:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFV0MVpUYm5xREhidDJVSXZBZTNaR3pMbzJTUE5pOEtwMmhYSWJJU3JROUJrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jodDwgGmgDHcD9C_YenNSz4Iulv6LRxQkAVGI9SRrw5cASXWxrczfvHj33roApQRWoNlZWX2Jcj3l0GstwTlY5vyEjZvyZ7i3pF78CGpYJLZ75q1yCLKeLT32SzcC-jLVFxCn5UOYZgA5B1iUKisdGRIP-lr3AQlgyxLJQM9XJEjySH4UR9dFMIx6mQvs8NMjnM8a6QAxCuKaP5RrrqwxaT_cEViZCDq8_YCvUWgYS6ps5bcB0WkKexMipqUsZSr3bw5VdNnPNkaHteVd2QAR1zfzlGeYw4fbXBZ2RTyhMwuih-LKNf7DtUkoujluyrFnpLS1B506PaEcXHY57FfVA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-10 16:07:51,326:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-10 16:07:51,327:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:07:49 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042741137 Replay-Nonce: eFSVlf8Ud_iklst7PNrl4yVyBltPpfs2VGHJ0ggt38uYJSGK37c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:49Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183613287" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042741137" } 2024-07-10 16:07:51,328:DEBUG:acme.client:Storing nonce: eFSVlf8Ud_iklst7PNrl4yVyBltPpfs2VGHJ0ggt38uYJSGK37c 2024-07-10 16:07:51,329:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:07:51,336:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183613287: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVkX2lrbHN0N1BOcmw0eVZ5Qmx0UHBmczJWR0hKMGdndDM4dVlKU0dLMzdjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM2MTMyODcifQ", "signature": "BhTk6CEUFQN1nVTxKhAcY8aHJSagfkT2TCmx2BCDjySb7pUz8JmUquWRFCfxSc9bUntbBHTyWwLYoDwy29TpqSnEVm7Wrm42j9bbORGsV9JCkqoCRzdKnQ0aC2uexTgMd4aY7YtbvfgKNQ_zGttuqVYAvIfQPqu8YCiUJ7SIbnGwBHCZsQJSISsyDdC6B0tRRJmC82H0LjJuNiQNQU-eB4g4yMnMAkzop7omqoDmzuiOP7vH1IyffjgoG8czpbw2x9SRzm5lqXmdfAa6IiI0qBdh-5vpFqTqAeeJxjm2aamI5eZVx-Ve0zHQLu4fMHw5jLD-wXR-NY8mJcNZg_fwmg", "payload": "" } 2024-07-10 16:07:51,509:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183613287 HTTP/1.1" 200 805 2024-07-10 16:07:51,510:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:49 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-IUaXXfwn8nCSlcbDCuwCPhnYNHzYjsTcie4h3tf77oc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:49Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/Dj3vNw", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/EcZFOg", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183613287/OjEpqw", "status": "pending", "token": "jrXVi8q0X_qI3Awc66rMXJqPEFnVUBrkD2cOC8BOnXs" } ] } 2024-07-10 16:07:51,510:DEBUG:acme.client:Storing nonce: zgT1AlV-IUaXXfwn8nCSlcbDCuwCPhnYNHzYjsTcie4h3tf77oc 2024-07-10 16:07:51,511:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:07:51,511:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-10 16:07:51,512:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:07:51,512:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:07:51,513:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:07:51,514:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:07:51,514:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:07:51,514:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:07:51,515:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:07:51,566:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-10 16:07:51,767:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-10 16:07:51,768:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-10 16:07:51,769:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-10 16:07:51,774:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-10 16:07:51,775:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-10 16:07:51,775:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-10 16:07:51,781:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-10 16:07:51,781:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-10 16:07:51,781:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-10 16:07:51,797:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-10 16:07:51,797:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-10 16:07:51,800:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-10 16:07:52,257:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-10 16:07:52,258:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:50 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "MlINTofUnV0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-10 16:07:52,260:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-10 16:07:57,006:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8344_key-certbot.pem 2024-07-10 16:08:01,493:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8342_csr-certbot.pem 2024-07-10 16:08:01,493:DEBUG:acme.client:Requesting fresh nonce 2024-07-10 16:08:01,493:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-10 16:08:01,643:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-10 16:08:01,644:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:07:59 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6w8otcuREJt1W_bHn44ejUXrbaFEifPsdxWcbl-90OjQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-10 16:08:01,644:DEBUG:acme.client:Storing nonce: oPjXeLW6w8otcuREJt1W_bHn44ejUXrbaFEifPsdxWcbl-90OjQ 2024-07-10 16:08:01,644:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-10 16:08:01,650:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZ3OG90Y3VSRUp0MVdfYkhuNDRlalVYcmJhRkVpZlBzZHhXY2JsLTkwT2pRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "L0M22abxKoEjlrPM2jF45-9P8t-he1cWmEz7QnhehnkUXpKA3CdXr09Nnw17tRDSCUOLWJ-OeizuGsmKOtvRsth9txaMMJAy-n6nZDMOTiSefbtDEqeUe1Se0anFvPnVKEufBfMndR_FDrQ-GyP4_8ghGpWaf23vOBys3RxJiwtPhOIbE4ddhxhp8VeK6nBL6qC_vehOWOPBjnJF-zGoFIddwOCGRvXYbCKIpDAZy1foUkBJd3hasDvy8AwN0pafFn4T7QHXukK4KmO7mLO15rGqYdzWVVcTpe1ydqG1xplOPJJX-meonENoV-nJviaLP52qal6gWs_46sOHQMJfqg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-10 16:08:01,932:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-10 16:08:01,933:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 10 Jul 2024 14:07:59 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/286042772467 Replay-Nonce: EPg6kJgqDIJVeNsDRaEnwFPvb81Tlnh76kPHemdRDJ_USq8iz8U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-17T14:07:59Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183661077" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/286042772467" } 2024-07-10 16:08:01,933:DEBUG:acme.client:Storing nonce: EPg6kJgqDIJVeNsDRaEnwFPvb81Tlnh76kPHemdRDJ_USq8iz8U 2024-07-10 16:08:01,933:DEBUG:acme.client:JWS payload: b'' 2024-07-10 16:08:01,939:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/375183661077: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FESUpWZU5zRFJhRW53RlB2YjgxVGxuaDc2a1BIZW1kUkRKX1VTcThpejhVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzUxODM2NjEwNzcifQ", "signature": "U0b2iLrZpDwFeEib9UrWLhVra-O3-6r1OkFx44KvNWZvJ0UiIr-xS07_ys12HQHG5FGzWPGqCKnUcxj1ZdL68hxiOWhCY1OvM0Ar3i0H1pCDcIdTIzjGuSXZ0S7MK9-eb50UNYmT7t2LRe5td8DFbR70Zrm0Vxa-UaFZWUQUrRiyw6Qd5l1oPPXtOu4dyqixjay1cy5nVAxpPr2oMKQ6huikItOKEUbgJX8qm1QoK1o9QzgsEC6ny_anfUWfxvd3jQV7M8yNAYVG3qwjH6xSj3Q0es38xlBCAGAZ21YENwKkwuUR_chpz1Zg0P3pJ9UXvRexXtoYbKlDAAtjO-TXuA", "payload": "" } 2024-07-10 16:08:02,103:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/375183661077 HTTP/1.1" 200 805 2024-07-10 16:08:02,105:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 10 Jul 2024 14:08:00 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqlWupyYK5rpwnsBO_UNemWciaOd_8DAAdMS7ZtCMbjAg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-17T14:07:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/mMPmZA", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/oiTplA", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/375183661077/6s0vLQ", "status": "pending", "token": "J3eRx7bxwWU6XNPfSesar4wC7KT2f2e3fpeefvGfAbA" } ] } 2024-07-10 16:08:02,105:DEBUG:acme.client:Storing nonce: EPg6kJgqlWupyYK5rpwnsBO_UNemWciaOd_8DAAdMS7ZtCMbjAg 2024-07-10 16:08:02,106:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-10 16:08:02,107:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-10 16:08:02,108:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-10 16:08:02,108:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-10 16:08:02,109:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:08:02,109:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-10 16:08:02,109:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-10 16:08:02,110:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-10 16:08:02,113:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-10 16:08:02,113:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-10 16:08:02,114:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-10 16:08:02,126:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-07-10 16:08:02,129:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)