2024-07-08 16:49:10,624:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-08 16:49:10,624:DEBUG:certbot._internal.main:Arguments: [] 2024-07-08 16:49:10,624:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-08 16:49:11,444:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-08 16:49:11,444:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-08 16:49:11,485:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-07-08 16:49:11,530:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:49:11,732:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:49:11,735:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-08 16:49:11,743:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-08 16:49:11,753:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-08 16:49:11,753:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:49:11,754:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:49:11,759:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:49:11,759:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:49:11,759:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:49:11,787:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:49:11,788:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:49:11,790:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:49:12,248:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:49:12,249:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:12 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "nJwvuV5JO6w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:49:12,250:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:49:17,513:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8275_key-certbot.pem 2024-07-08 16:49:22,386:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8273_csr-certbot.pem 2024-07-08 16:49:22,387:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:49:22,387:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:49:22,536:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:49:22,538:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqZA2G6GM_rWZa4qvgcKmOV4ZA9xuY4vx66nFGXSARxSs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:49:22,538:DEBUG:acme.client:Storing nonce: EPg6kJgqZA2G6GM_rWZa4qvgcKmOV4ZA9xuY4vx66nFGXSARxSs 2024-07-08 16:49:22,539:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:49:22,548:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FaQTJHNkdNX3JXWmE0cXZnY0ttT1Y0WkE5eHVZNHZ4NjZuRkdYU0FSeFNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "hzl6maQXGSjfIK4GSqOJosgCRtWLQNKiybv4UxHC4B7c15QCYIjlhOkwMmcHmkJjelglOfFnwYWd7dI6z0212fn6co5mSYdPpV2igTCqebJXU_e2wSwlTu1kqoy4MwuRsZq02RbxQvBfGDRq14SIJ-0KLAmXtdh48CfWMM4cXURRUj-8NWumTrR_DSYeI6_HVxVa5SVYtGWczfwia5F0DFaH17MQ6f3rtmJvThuydgPIIxx2en4e72LMwE-ClWu7gsUlvzVN-_fs2LiMxEqlwdVMRvcxyvTvn10fopxuNdfp-YD1JiyVO-xBMHN2d39zhSxFW7VWNpi22md99rsM1w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-08 16:49:22,709:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-08 16:49:22,710:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:49:22 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963066047 Replay-Nonce: EPg6kJgqizmQuZpiQuJTYTA8gjLx3nyNyWc25pC8ERBPvwsgw-s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:05Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963066047" } 2024-07-08 16:49:22,710:DEBUG:acme.client:Storing nonce: EPg6kJgqizmQuZpiQuJTYTA8gjLx3nyNyWc25pC8ERBPvwsgw-s 2024-07-08 16:49:22,710:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:49:22,721:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3Fpem1RdVpwaVF1SlRZVEE4Z2pMeDNueU55V2MyNXBDOEVSQlB2d3Nndy1zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMwNjU5MTcifQ", "signature": "s5Rwco67mOsGpVFLXp51KnoZlLV3uAyIOM7z1KA9x7xVet5GBWuSbetPQAhFdrFHiSH9n2GXL8XssynxXE0C1uWA1567mngdNTKp2iPMQUfHN6YTRxEfmQVUcRDlEcR2pOrJRbVFqi-sV4xfyXmVu8BuVEYh8a8DnZnlk63ZymCfvNE8cQUnrjdbiD2jD0ItTH9Q6BjhUY8LtMFhJaDpbcNIZjWSOix1o7OIppTAuKMY6-7JNzh1-_4KTBynMHUPspeZ0rY461jgZDNdWWyjsN6-Xu6Tshv2fgvsAbkHr4rrA6Hjw5jePoI7Ymp7u3xsSdaLlrpT_GW0P1ptgmjeuA", "payload": "" } 2024-07-08 16:49:22,877:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123065917 HTTP/1.1" 200 810 2024-07-08 16:49:22,878:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:22 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqAWngRgZHcd8DvqqxzoEs5ziFXRXE7Rk4xyzkGnAm-qY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:05Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/AopFCQ", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/xbrZjg", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/2pJhlw", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" } ] } 2024-07-08 16:49:22,879:DEBUG:acme.client:Storing nonce: EPg6kJgqAWngRgZHcd8DvqqxzoEs5ziFXRXE7Rk4xyzkGnAm-qY 2024-07-08 16:49:22,880:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:49:22,880:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-08 16:49:22,881:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:49:22,882:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:49:22,896:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:49:22,896:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:49:22,896:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:49:22,896:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:49:22,902:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:49:22,943:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:49:23,167:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:49:23,169:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-08 16:49:23,171:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-08 16:49:23,179:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-08 16:49:23,179:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:49:23,180:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:49:23,191:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:49:23,191:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:49:23,192:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:49:23,206:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:49:23,207:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:49:23,209:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:49:23,685:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:49:23,687:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:23 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "PRw5sGRPBEY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:49:23,688:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:49:28,766:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8276_key-certbot.pem 2024-07-08 16:49:33,473:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8274_csr-certbot.pem 2024-07-08 16:49:33,474:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:49:33,474:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:49:33,630:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:49:33,631:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8U3ipZm5T4TIaH6YRFeWl6kXY3jCLLYL52oCF5GEzT98U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:49:33,632:DEBUG:acme.client:Storing nonce: eFSVlf8U3ipZm5T4TIaH6YRFeWl6kXY3jCLLYL52oCF5GEzT98U 2024-07-08 16:49:33,632:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:49:33,644:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFUzaXBabTVUNFRJYUg2WVJGZVdsNmtYWTNqQ0xMWUw1Mm9DRjVHRXpUOThVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "C6wjKPVbjC4y_vyBTIT-bJuqghIEh1lrvu2oHPzC4tYqQFvkbVCQQ0QqPXJZL2thnjjadZGbB5L9P_44SEt0jaPh8s8zy7JZIWvLh3YQe98gzckvaQhjXWQ5uX23louq9Z0drFXf2jF63yTCbqtKoJY9S0E0TZY9McYLGIBE8tKVXsSxVqqD_xnrlcZLUHV2THTxtFCpVgTWT4wuynrIQEFvQAd4QSQSdyvWtrNg10_rxu1RrSggxs058iRUGNSIBWdscPvixZhJ1NJiB7OU5uEtQHrKXdFispMe8gjYjS5W17erzPz6GG3CyAwFpIJrECalClvhQTQDSZSQrgnuzQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-08 16:49:33,828:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-08 16:49:33,829:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:49:33 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963103477 Replay-Nonce: eFSVlf8UzeTCCvG-rbORzGsCdYGPLgUZM2Gy9SRn2zv0fnAMhyc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:16Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963103477" } 2024-07-08 16:49:33,830:DEBUG:acme.client:Storing nonce: eFSVlf8UzeTCCvG-rbORzGsCdYGPLgUZM2Gy9SRn2zv0fnAMhyc 2024-07-08 16:49:33,831:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:49:33,844:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFV6ZVRDQ3ZHLXJiT1J6R3NDZFlHUExnVVpNMkd5OVNSbjJ6djBmbkFNaHljIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxMjE5NjcifQ", "signature": "EpO6RrQ36eNx_-05nfA4zpDhNupCjZVHtp-WGaI1KbDJyJZ6hSYQLa9uSxZXQwE42x7O0cyllrOCzqKqPLKoFJEcS9CGXBl2KxosCF7t4rWUjFT9sPwnp0yC3bzwPI3YisTkULJXScXfGMkalKfvcnLBxxrjKVKn8vCOOt-5KFgMTHeRSguNtQTi0Dw2yo-WTMnSyLmKpt3UXh7JpBK29j2GC8zbEegtCWAOaksfOBemajGuvlV6bTtFuhvawyaN4YGnWmbUrnFbPKT12xDqfaYbSEOO8L7EGnzux5FcXrXj_bOR5IW2SLoaSfLN6dq_wfTOFHHRZWZmA9etMAHqNg", "payload": "" } 2024-07-08 16:49:34,005:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123121967 HTTP/1.1" 200 804 2024-07-08 16:49:34,007:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:33 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-kueeqTT-y2INx_OkDZ7oAaLlT_F9jyYOClGouzqEWP8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/Ag883A", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/g4f58w", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/s77iUg", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" } ] } 2024-07-08 16:49:34,007:DEBUG:acme.client:Storing nonce: zgT1AlV-kueeqTT-y2INx_OkDZ7oAaLlT_F9jyYOClGouzqEWP8 2024-07-08 16:49:34,008:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:49:34,008:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-08 16:49:34,008:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:49:34,009:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:49:34,009:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:49:34,009:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:49:34,010:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:49:34,010:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:49:34,011:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:49:34,068:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:49:34,257:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:49:34,259:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-08 16:49:34,260:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-08 16:49:34,267:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-08 16:49:34,267:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:49:34,267:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:49:34,273:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:49:34,273:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:49:34,273:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:49:34,278:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:49:34,279:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:49:34,280:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:49:34,767:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:49:34,768:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:34 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "lZ6n-Bl4itY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:49:34,768:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:49:39,603:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8277_key-certbot.pem 2024-07-08 16:49:44,258:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8275_csr-certbot.pem 2024-07-08 16:49:44,258:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:49:44,259:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:49:44,420:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:49:44,421:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8U25xav-dhoEIEr33ULUSpkQ1cXd99gwXQWTiUdUrYl18 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:49:44,421:DEBUG:acme.client:Storing nonce: eFSVlf8U25xav-dhoEIEr33ULUSpkQ1cXd99gwXQWTiUdUrYl18 2024-07-08 16:49:44,422:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:49:44,435:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFUyNXhhdi1kaG9FSUVyMzNVTFVTcGtRMWNYZDk5Z3dYUVdUaVVkVXJZbDE4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QcDaysROhuHKnHTjfk3WQJRLKvrmW3C2I7BN1i_LhYEP7VMzogAiWAGw0r7DlbmcICAXAFqozpMq4-ynDOL3lWkBQ9cyEbzZb_guTIOD8J1gLZon6fkAcbKVKe_1wvaI1MTNAoPOTdwkqJ1eyQIs7ayyxqPDF91DG-z0HSVxOz9Jwn-nth8au1DLnu5qZfpLiVx97AM1f72085vej6XFlZa2Db1SXlpj5g3AcduXoHPGSfaFNEV1krZLbIJ8OlxSW839Kx6-U_oXb8ouTWd31PG7Vu2VAeZvIcGy7L1wH51BDl_lEnM7HvZ6iAEocG0lB9Gsjrs85_kCJYRe_Y9izA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-08 16:49:44,621:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-08 16:49:44,623:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:49:44 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963135847 Replay-Nonce: eFSVlf8U01tW7WmkQfIldxAXuybs0hJl6Lojuz9gkd6onyzXBRQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:27Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963135847" } 2024-07-08 16:49:44,623:DEBUG:acme.client:Storing nonce: eFSVlf8U01tW7WmkQfIldxAXuybs0hJl6Lojuz9gkd6onyzXBRQ 2024-07-08 16:49:44,624:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:49:44,632:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFUwMXRXN1dta1FmSWxkeEFYdXliczBoSmw2TG9qdXo5Z2tkNm9ueXpYQlJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxNzEwOTcifQ", "signature": "WT2SfBzOvi3cNgWVeg5q35ypalmWc6tBgVeOxna_Lm-17LnFF8ab-t6EHZKoP_tO-3_h4dmP1_FEBtf8fjJKQ47J2kpwOEp_8XQNRwq7XJJecMZGdMgAjhSygUAPMRBjuobN_9ytwG1QXlu8sxLrqK-_TQe6sVApccqWoPcRvNCryBkShnhfO6AP1CEKEORdRoxSGjLMncHinHfum3-qtoa-kL-wfmyT5m7aRrmW1DSnZSr9HouHAaKAgDWvKUGihiTccQ9w-eJVkxSfdG0LfnHBujz_vfwkXeBUWYmdkj87n3a97atugdFGIKU1Ui5gXtkP_EuDgxaIRHuRWGRylg", "payload": "" } 2024-07-08 16:49:44,797:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123171097 HTTP/1.1" 200 807 2024-07-08 16:49:44,798:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:44 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-QV3GwQCF4xZ4dZQA-mIX-JLHrhpv-si8L1D-tc1XNSk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:27Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/vQZynA", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/XD91Zg", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/qlRt6w", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" } ] } 2024-07-08 16:49:44,798:DEBUG:acme.client:Storing nonce: zgT1AlV-QV3GwQCF4xZ4dZQA-mIX-JLHrhpv-si8L1D-tc1XNSk 2024-07-08 16:49:44,798:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:49:44,799:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-08 16:49:44,799:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:49:44,799:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:49:44,800:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:49:44,800:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:49:44,800:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:49:44,801:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:49:44,802:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:49:44,842:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:49:45,036:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:49:45,039:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-08 16:49:45,040:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-08 16:49:45,048:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-08 16:49:45,048:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:49:45,049:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:49:45,054:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:49:45,054:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:49:45,054:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:49:45,069:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:49:45,070:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:49:45,075:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:49:45,525:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:49:45,526:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:45 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HD6XydZQpHc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:49:45,528:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:49:50,915:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8278_key-certbot.pem 2024-07-08 16:49:55,627:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8276_csr-certbot.pem 2024-07-08 16:49:55,628:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:49:55,628:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:49:55,777:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:49:55,778:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6VnD6b-bb-QzmI-teRUoEFFAeOlLGCMys1yE7EnNlKJQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:49:55,778:DEBUG:acme.client:Storing nonce: oPjXeLW6VnD6b-bb-QzmI-teRUoEFFAeOlLGCMys1yE7EnNlKJQ 2024-07-08 16:49:55,779:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:49:55,790:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZWbkQ2Yi1iYi1Rem1JLXRlUlVvRUZGQWVPbExHQ015czF5RTdFbk5sS0pRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YFj4g-DOUl-zYGQTl4X_KCJgLcMta9bpBNaYkIQRI74DHsbue4wE0e3zXz_m6dQRjw5_O49HwpKjmWebeK3pQjmU6_RwNjoXUan00Gl2MUN2l1fbn1Dul8FgkvVOpGiLuBNkBYdmVnwEts8k0adeMb8-fhM386DkaIbKeuXEo7a96aiM-Cp42c60e9zjXmOka1EH0bvp0PTldY2pRiPQ1au_aDtzrcsR0nsYORffYsgk9lFgSvvuLETgPIJCn1bwAfVDxGHdL9J-p5KwaqN19Y83OFHEekZdiOzUGu7OMDAznrJxUwWul_rcjDhaA9w9T8tsxBfShPCsJ4bcIJMEGg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-08 16:49:55,954:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-08 16:49:55,955:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:49:55 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963164787 Replay-Nonce: EPg6kJgqofBVQDbdEaTNh31a3Cpp5U3PGMcJ03micWg_kxjx5-8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:38Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963164787" } 2024-07-08 16:49:55,955:DEBUG:acme.client:Storing nonce: EPg6kJgqofBVQDbdEaTNh31a3Cpp5U3PGMcJ03micWg_kxjx5-8 2024-07-08 16:49:55,955:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:49:55,961:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FvZkJWUURiZEVhVE5oMzFhM0NwcDVVM1BHTWNKMDNtaWNXZ19reGp4NS04IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyMTQ1MzcifQ", "signature": "suitv8Fh77oX1FtkXlnTbXuIdd4jkN-K3oLlIQI1Q8qo-GBbJw8ZVIm8NsYBtju4x-vobJb7anZq3GwQV1HH77Y9di8Ssndccx7f-86SphKEPclRMQjpGL1UazR14WJXu40Vv34nGOFfujzaeXiriUYbCz1oZ16b99gDWVMwnZE7LCOkrjti1dCAWKupKCe5XwWNdzKqETbFBF4xV-3zNAMNVilQT35sFNvyUj1f-B2q1i5Slctj7wDJhH77Ncxyqw6Hobsh9Q1RwkJKc3tpYwrySd38Zk-cGrOuBKiSvTMF53CJOU_PZWckn20CRXWOScb4A-M0Hy4WC7sS9HQvLA", "payload": "" } 2024-07-08 16:49:56,115:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123214537 HTTP/1.1" 200 801 2024-07-08 16:49:56,116:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:55 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqxxGsCAyuGunJMHqpIYl-ro1sLymXwduo8X1ZsSudOoo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:38Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/FMZRsw", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/6lpfOw", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/gp7pwg", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" } ] } 2024-07-08 16:49:56,116:DEBUG:acme.client:Storing nonce: EPg6kJgqxxGsCAyuGunJMHqpIYl-ro1sLymXwduo8X1ZsSudOoo 2024-07-08 16:49:56,118:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:49:56,118:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-08 16:49:56,119:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:49:56,119:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:49:56,121:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:49:56,121:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:49:56,121:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:49:56,122:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:49:56,124:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:49:56,167:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:49:56,368:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:49:56,371:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-08 16:49:56,372:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-08 16:49:56,377:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-08 16:49:56,377:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:49:56,377:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:49:56,382:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:49:56,382:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:49:56,382:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:49:56,402:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:49:56,403:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:49:56,405:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:49:56,886:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:49:56,887:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:49:56 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "k6q1J5MIOh0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:49:56,888:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:50:01,854:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8279_key-certbot.pem 2024-07-08 16:50:06,625:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8277_csr-certbot.pem 2024-07-08 16:50:06,626:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:50:06,626:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:50:06,785:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:50:06,787:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-dRRQqfYzk2yEdTn4hyqS1nNCmy0HfCvSDNds7B2E8so X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:50:06,787:DEBUG:acme.client:Storing nonce: zgT1AlV-dRRQqfYzk2yEdTn4hyqS1nNCmy0HfCvSDNds7B2E8so 2024-07-08 16:50:06,788:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:50:06,801:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1kUlJRcWZZemsyeUVkVG40aHlxUzFuTkNteTBIZkN2U0ROZHM3QjJFOHNvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZenH0dJldlXwv7X95T6MGYq5y3F_AYaQt9JHghBi0lrjQsLGo4zehTkpqpo2DaTKB8jsdZxCXcpZxQYHoggcAsuerg5lMYZD3he0f5n2YgApvv7LW7rPAVZMjwUbg68WB-z4Esnivw8oc6PoRvOkFdx6JT9WrNJrp4Tz_sJL3C-H395_TUvNkiNtbuzGvb7zgnvHwT_0CfJBPogfcOyWEKz_lgun5eu47hJW6AO2agA2KxYDTF7fnw4PWhvEUVeYAYMEM_lAYBTidlW0lEUqdBg2UMc34-kQc7YvyW6csUiFU-oOLYsdocegccumuBgsx9qpQ9jyprKJdxDnj6au3w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-08 16:50:06,990:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-08 16:50:06,991:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:50:06 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963193117 Replay-Nonce: eFSVlf8UObFOYSyikKoy7SXxIoMGI0csE7rrEF4GmsM9QjDgtBA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:49Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963193117" } 2024-07-08 16:50:06,992:DEBUG:acme.client:Storing nonce: eFSVlf8UObFOYSyikKoy7SXxIoMGI0csE7rrEF4GmsM9QjDgtBA 2024-07-08 16:50:06,992:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:50:06,999:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVPYkZPWVN5aWtLb3k3U1h4SW9NR0kwY3NFN3JyRUY0R21zTTlRakRndEJBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyNTgyNzcifQ", "signature": "iM9RW9uNj_eVZQOiXjffldhk4ibO83WsZZos5JUNqOSXqkWjHJtaylukgOEG8r_-C7h3yj0M3xJICgOOKObBWIxkt_CtBG2Jlo7QaWl6kPmALQ_LSj-mRrYCMbRqBTx7d081RPVAYsKPGztFeCkSnUKfZzRX2sDYjIXM_BdXUwzUMabXUHYRMnZTtDlbXbhfqG4lcYSKOuiBTexEOYM5T4skuHrA7JrmV4jiiveosxbMhQjQifNPCX3KhDD_jI1iKppHgrfJCx9xApzzNPEgbZChVzyShIrtQhywNadRuJk7tetnfwz7WVaQtE514yWjFJhcuV8Ddc9OyRa_Ycpafw", "payload": "" } 2024-07-08 16:50:07,163:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123258277 HTTP/1.1" 200 805 2024-07-08 16:50:07,165:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:06 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-3c_J_T2OGCKSKf9yaXh5lHJh85sDgXRsDC4ta5Z0KSE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:49Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/7Y8QQA", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/6IRQnQ", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/ZS_Kuw", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" } ] } 2024-07-08 16:50:07,165:DEBUG:acme.client:Storing nonce: zgT1AlV-3c_J_T2OGCKSKf9yaXh5lHJh85sDgXRsDC4ta5Z0KSE 2024-07-08 16:50:07,166:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:50:07,167:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-08 16:50:07,168:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:50:07,169:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:50:07,170:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:50:07,170:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:50:07,171:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:50:07,172:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:50:07,173:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:50:07,215:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:50:07,415:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:50:07,417:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-08 16:50:07,418:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-08 16:50:07,426:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-08 16:50:07,427:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:50:07,427:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:50:07,432:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:50:07,432:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:50:07,433:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:50:07,437:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:50:07,438:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:50:07,440:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:50:07,928:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:50:07,928:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:07 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8U7vd_lszak": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:50:07,929:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:50:12,843:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8280_key-certbot.pem 2024-07-08 16:50:17,637:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8278_csr-certbot.pem 2024-07-08 16:50:17,638:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:50:17,638:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:50:17,800:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:50:17,801:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-lqG-rINzrTlyVWhlFB7fm09vQAJ4xEExhykJ92xbg6c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:50:17,802:DEBUG:acme.client:Storing nonce: zgT1AlV-lqG-rINzrTlyVWhlFB7fm09vQAJ4xEExhykJ92xbg6c 2024-07-08 16:50:17,802:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:50:17,811:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1scUctcklOenJUbHlWV2hsRkI3Zm0wOXZRQUo0eEVFeGh5a0o5MnhiZzZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BatcLjKXzZECc3xCKXLd_HEKZlCFR_dEBPM8kcYdgTOlckIgBbSuN7ECl03FTsFoOOFIDIjlRAo-brtX6I7WEEpN82Rl8MJDoBpVx6ee1GWdGo8PiX5FW8XsBXsE6z6I4KHhBu0uqWfW2E3EoZWpbIV5gibbS2n5aErwK3ub0mtneOdbVV0O1sx22-LYb6zBQIIU0dQ5CtCCO7aieX46t2NnBL29EwzbsKXvAZsjktYvplDkG5otM2W_i_sbqvsD_2pVLVFaNW2KUt6enAufvlHiq1TzdFO_nSyksAmzcAFuM5REtGiGpM_tkfLK1YgWyU1vjcO9riFIbi9w66VrkA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-08 16:50:18,008:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-08 16:50:18,009:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:50:17 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963222697 Replay-Nonce: zgT1AlV-JYUVeqwCBm5HJaovuaR9_WZlztOH6H2cFqozjytC5tg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:59Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963222697" } 2024-07-08 16:50:18,010:DEBUG:acme.client:Storing nonce: zgT1AlV-JYUVeqwCBm5HJaovuaR9_WZlztOH6H2cFqozjytC5tg 2024-07-08 16:50:18,011:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:50:18,020:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1KWVVWZXF3Q0JtNUhKYW92dWFSOV9XWmx6dE9INkgyY0Zxb3pqeXRDNXRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzMDE4NjcifQ", "signature": "bk15OQKjfoeCQCTQNVXjmJwSXs-wYsNjMvtDZMdz0seUmtr-qwnvkEuI8Q-tYsiHh36T6gF8ZrKzRpSVn-64d1MSuDma5ygDxPmcHYQsMA8tVsr5-5gFT-jZeBUmwTBWcYLxq0Uek7wdggcdJbwwhWSHlCdsfO-UOjW_qvvFCYXN_OS6gBtyo2zIFTJDpOM61yllmKdC5lH-G7GC2pKUQCvKNfw1Jmmg9c_oMHzHlcnD5Uef7xk1rX5BYXjjED0xAzaOWqHQnwXFCftFwpo0FXZk8q0QzZwTGPl7wkymIvpRdYZtQ7DhxOhTaQ37J7JIGFRrnjwH80fTPB1AKoBSiQ", "payload": "" } 2024-07-08 16:50:18,188:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123301867 HTTP/1.1" 200 809 2024-07-08 16:50:18,189:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:17 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-SsQbz8O1Gm7NI_kCVZywJaI04OJ4Aea4hrLD3v3-wY4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/VjMp2w", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GGZVqQ", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GI9X-A", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" } ] } 2024-07-08 16:50:18,190:DEBUG:acme.client:Storing nonce: zgT1AlV-SsQbz8O1Gm7NI_kCVZywJaI04OJ4Aea4hrLD3v3-wY4 2024-07-08 16:50:18,191:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:50:18,191:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-08 16:50:18,192:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:50:18,192:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:50:18,193:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:50:18,193:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:50:18,193:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:50:18,194:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:50:18,196:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:50:18,233:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:50:18,436:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:50:18,438:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-08 16:50:18,439:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-08 16:50:18,443:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-08-06 23:03:56 UTC. 2024-07-08 16:50:18,443:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:50:18,443:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:50:18,448:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:50:18,448:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:50:18,448:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:50:18,478:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:50:18,479:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:50:18,481:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:50:18,964:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:50:18,965:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:18 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "cTi3-7LDLL4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:50:18,966:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:50:23,864:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8281_key-certbot.pem 2024-07-08 16:50:28,581:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8279_csr-certbot.pem 2024-07-08 16:50:28,581:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:50:28,582:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:50:28,741:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:50:28,742:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-l7-oU8stvCkv-UjIhdqe0VU3shekVFLwJJXahDe9dHg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:50:28,743:DEBUG:acme.client:Storing nonce: zgT1AlV-l7-oU8stvCkv-UjIhdqe0VU3shekVFLwJJXahDe9dHg 2024-07-08 16:50:28,743:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:50:28,749:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1sNy1vVThzdHZDa3YtVWpJaGRxZTBWVTNzaGVrVkZMd0pKWGFoRGU5ZEhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "n6vDysmCIZz8BZ5-8-Adx69DfNIZkAwDPPMhZVLml0t96uiVp_n5VjgPg93StgZbZU0CeqHJg7Buzw0j9p7lEiP8l6KErTxTe9E3zf8-yG0NkZnE4WQ3wheXyw_483I76EUaT_PL9MYSKaoTdyDl7p-U3P-ykrJ4PoD1zLu3dNacX1-bJgGn1PP6hUTPU81cFG_u-CMWyGLyDwx3y43y_jFXeJovZqjA7nas8IVVcUiz9r92rJXmre5_19wVtXoO9L_-kmG4Dw1szX162wrdS7TBaSHUQQsSiVliSzVhjdIJp2NoMXyKn3et_Fsz9YSn6QcQwihhF-oKTq9KMQCWUg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-08 16:50:28,933:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-08 16:50:28,935:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:50:28 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/285341919627 Replay-Nonce: zgT1AlV-5QRsh5wambyL6Oa9hhxsTt_SwN7SBEPsy06_f0Ub5ck X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-15T04:13:07Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/285341919627" } 2024-07-08 16:50:28,935:DEBUG:acme.client:Storing nonce: zgT1AlV-5QRsh5wambyL6Oa9hhxsTt_SwN7SBEPsy06_f0Ub5ck 2024-07-08 16:50:28,936:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:50:28,942:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/374150202447: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi01UVJzaDV3YW1ieUw2T2E5aGh4c1R0X1N3TjdTQkVQc3kwNl9mMFViNWNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzQxNTAyMDI0NDcifQ", "signature": "Y0SmRaAkQIz1i7PTDGFgwARcaZXslC7XyH-FI_eYWyQOz51B_JxpFhpcMviIpjLZZatRNLRLmygbYWhJbuPiS93ezoFjjSMRXIu1DDxKm5Wqe--l_Mxc3qlMoWJ8Vmbhq8cGSN2kdlWwl6upqfT1injj9cPkAEz-pVxN9NjeclTA5sTccGRh3QpXAD1m-RAnc-nmdwuj3trJFt9NQ4b_rPNSMhtmItezBMMmshnALgSgUcFLVmFy0YlhLzTns3Mc29V283fX3PktXSm0sgLCLRZBCIjBkSi-SztZxLq5HOD2x2kO9Hz3RPdbcY0ZoXmEquX_kwJJMqRDp8MhyPlDlA", "payload": "" } 2024-07-08 16:50:29,107:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/374150202447 HTTP/1.1" 200 807 2024-07-08 16:50:29,109:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:28 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-EOhAe4JoO0JtNevun_97xj4PE_8opdSWut665qIunTI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-15T04:13:07Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/NY8rUA", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/R0qBhg", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/374150202447/2vSv0A", "status": "pending", "token": "kMD8ydZZw6mT67zhwoE3ZFUm3XunPTvc6pF0MMrStfU" } ] } 2024-07-08 16:50:29,109:DEBUG:acme.client:Storing nonce: zgT1AlV-EOhAe4JoO0JtNevun_97xj4PE_8opdSWut665qIunTI 2024-07-08 16:50:29,110:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:50:29,110:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2024-07-08 16:50:29,110:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:50:29,111:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:50:29,111:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:50:29,112:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:50:29,112:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:50:29,112:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:50:29,113:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:50:29,163:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:50:29,372:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:50:29,373:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-08 16:50:29,374:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-08 16:50:29,378:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-08 16:50:29,379:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:50:29,379:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:50:29,384:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:50:29,384:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:50:29,384:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:50:29,389:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:50:29,390:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:50:29,392:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:50:29,872:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:50:29,873:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "qTswGhY5VzI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:50:29,873:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:50:34,991:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8282_key-certbot.pem 2024-07-08 16:50:39,694:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8280_csr-certbot.pem 2024-07-08 16:50:39,694:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:50:39,694:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:50:39,855:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:50:39,856:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-tDLyzT6uS02COB5y9bpddZDdpz3x1qxMtbRMPBqrSxU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:50:39,856:DEBUG:acme.client:Storing nonce: zgT1AlV-tDLyzT6uS02COB5y9bpddZDdpz3x1qxMtbRMPBqrSxU 2024-07-08 16:50:39,856:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:50:39,863:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi10REx5elQ2dVMwMkNPQjV5OWJwZGRaRGRwejN4MXF4TXRiUk1QQnFyU3hVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dGjedisBr8MVd199Z42lS10WuiqvxhWXoH8ETPMHIFdyWohwyzvMgF4h3GQS8tWrYlePDGY_Zyc7_E610uZ4uKr0nTsfoqjacXyPt1e2-GRBOUCVK6ZRlnhtjvrv6c_UjCB3FS0ZwRy0VuAaCQqBtiMNAxZ_WVTY0_BjE7OzWitiwrhPTrP47ffu81kr1B2q7-Fg-EmS-ORKsILZGoU-2X2sKeL0xdalnkhuped1DkdawKbDY50Ae7yTi_s8vKPF2cRs2oVxnNGGwU01Bzuu0VAp-Sy5ZBUFrQJaTnQ0gZikq80BkmIEoYtQAWqX77L9NvDL2vk_guRN0iy0s_xT3A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-08 16:50:40,044:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-08 16:50:40,045:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:50:39 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963261767 Replay-Nonce: eFSVlf8Uyjzh5AaqhVTfb_I767Mtumw5i9BpeBVeKU1TGoZZSmk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:10Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963261767" } 2024-07-08 16:50:40,045:DEBUG:acme.client:Storing nonce: eFSVlf8Uyjzh5AaqhVTfb_I767Mtumw5i9BpeBVeKU1TGoZZSmk 2024-07-08 16:50:40,045:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:50:40,051:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFV5anpoNUFhcWhWVGZiX0k3NjdNdHVtdzVpOUJwZUJWZUtVMVRHb1paU21rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzNTc4NjcifQ", "signature": "llFT5jlk7Roak57_qOFnhvAbfVhqw4rOnw59TaLKauSCKVrh9sdnLLwhwnYEX2feTg9Fp8g0PrdYwietmc6aRWwz2iuzTzn45e55OiQHRoO7ehEwPt8HW8wQ21_feBcvbgkF5BefEO75Q94zSo9zfsbIbuFg-Rrwfei3OW63eGA80aImpTMJAtNLBGoWTyfe3-LjrMumli0UE6fsawxgeLyi_h_kAlAzIEXsy1j9heBlFhWm35DpMeKdVvoAM-BuanjATwcK9QZE6Y9Q8ZQjkUVECkkHlDeMFjCnQir8U8DNUV7XiACXY7HleWVbhEdEB7_95FYMCjx3vVlQUcOsnA", "payload": "" } 2024-07-08 16:50:40,215:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123357867 HTTP/1.1" 200 806 2024-07-08 16:50:40,217:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:39 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-ZLH2liwA5lZh64U4c27pzpPzqKeM2tak6oJ06IhMWyw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:10Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/mRUn6w", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/Flovww", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/ejtuAg", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" } ] } 2024-07-08 16:50:40,217:DEBUG:acme.client:Storing nonce: zgT1AlV-ZLH2liwA5lZh64U4c27pzpPzqKeM2tak6oJ06IhMWyw 2024-07-08 16:50:40,218:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:50:40,218:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-08 16:50:40,219:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:50:40,220:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:50:40,220:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:50:40,221:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:50:40,221:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:50:40,221:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:50:40,223:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:50:40,270:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-08 16:50:40,271:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:50:40,271:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-08 16:50:40,279:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-08 16:50:40,281:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-08 16:50:40,281:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-08 16:50:40,281:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-08 16:50:40,282:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-08 16:50:40,284:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-08 16:50:40,322:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:50:40,504:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:50:40,506:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-08 16:50:40,508:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-08 16:50:40,516:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-08 16:50:40,517:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:50:40,517:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:50:40,523:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:50:40,523:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:50:40,523:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:50:40,528:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:50:40,529:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:50:40,531:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:50:41,001:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:50:41,002:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:40 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "m7rXYF1EIE4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:50:41,003:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:50:45,898:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8283_key-certbot.pem 2024-07-08 16:50:50,559:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8281_csr-certbot.pem 2024-07-08 16:50:50,560:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:50:50,560:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:50:50,715:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:50:50,716:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UM51znTCJjIoMZaIHIul2RTZhrw6dPSnyFJZO1_kH33E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:50:50,716:DEBUG:acme.client:Storing nonce: eFSVlf8UM51znTCJjIoMZaIHIul2RTZhrw6dPSnyFJZO1_kH33E 2024-07-08 16:50:50,716:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:50:50,723:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVNNTF6blRDSmpJb01aYUlISXVsMlJUWmhydzZkUFNueUZKWk8xX2tIMzNFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "yqRRxuVayMRmujIsIF2qI5CVeQPcGZrHbjJZb7W3umiAuSHh95z_DnPvuZgRnyUyIzpN4BAy43iG8zzUQR-wumDg9Pi4lrfkqEL8hkbDuOTZqXxf1K-0Xe9DnGtbXkndzu9QEjaIP0xWy5jJyiUYKy14AuaNnolDRlfw7RCBBm_7VQmUySPNepVVnsvoxo11JlDwSlHlTfwZzx6Rh7uXkAuAf9B-5Aj5EDtlC-9uHABcWNX6AEHFENVWZwHy2Ij8oQ5oWd29f78ZZJAxWVCs5xOGlgLvqD0vyWKfmKNAf62n1VcVqfvTpqMFFAvPHlE5Xn0HLaXCpAV-aEw0VuFHZw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-08 16:50:50,905:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-08 16:50:50,907:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:50:50 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963292297 Replay-Nonce: eFSVlf8UxPAtf2AdMR0IhQ_X3JHM3Ub4zvK_epLsJuADIfdAWmU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:20Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963292297" } 2024-07-08 16:50:50,907:DEBUG:acme.client:Storing nonce: eFSVlf8UxPAtf2AdMR0IhQ_X3JHM3Ub4zvK_epLsJuADIfdAWmU 2024-07-08 16:50:50,908:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:50:50,916:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFV4UEF0ZjJBZE1SMEloUV9YM0pITTNVYjR6dktfZXBMc0p1QURJZmRBV21VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0MDc1OTcifQ", "signature": "yJR2oiYVWrfx1te2PFk9-8Kq4JiZqIMQ5O80h9BAJD_uxZYK4Rv3uMOUczPbf4n_NVuwXtGPNStSDYMNA1pyosxSxG8LD4JrRVT8PiyBliSanC7JYrqFUtUEltTqaliqm9okdL4yFt4rZiT_tME_QqhVAY6weTfxnC2w9sVPzfx3gM-9Ib3JVCxM616FELe_qXOb2k_bOza4b7O-A72YFlt8eKkWplpqiOq-RYxgEQU3cGzxudzraCgEgY00Ivbms88ayLlUcl-OZ6FgrzTqX66iufQrS2HVRFHi3a8U2ioPNaPw2glvxorxyzp74ipop61zPR6qWNm0KWiyaIXugQ", "payload": "" } 2024-07-08 16:50:51,088:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123407597 HTTP/1.1" 200 811 2024-07-08 16:50:51,089:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:50 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8Ul4cjEgruw83WSWDzy2mSle9dDvnC7f6JRhjfkuZ_PY0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:20Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/PlHedw", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/IGmPMQ", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/vPSuUg", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" } ] } 2024-07-08 16:50:51,090:DEBUG:acme.client:Storing nonce: eFSVlf8Ul4cjEgruw83WSWDzy2mSle9dDvnC7f6JRhjfkuZ_PY0 2024-07-08 16:50:51,091:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:50:51,091:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-08 16:50:51,092:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:50:51,092:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:50:51,093:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:50:51,093:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:50:51,093:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:50:51,094:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:50:51,095:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:50:51,145:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:50:51,353:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:50:51,356:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-08 16:50:51,357:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-08 16:50:51,365:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-08 16:50:51,365:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:50:51,365:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:50:51,370:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:50:51,370:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:50:51,370:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:50:51,375:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:50:51,376:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:50:51,378:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:50:51,864:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:50:51,864:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:50:51 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QLGnK4c1eFw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:50:51,865:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:50:56,623:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8284_key-certbot.pem 2024-07-08 16:51:01,286:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8282_csr-certbot.pem 2024-07-08 16:51:01,287:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:51:01,287:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:51:01,449:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:51:01,450:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UFTml1PX_ufZnfCHkKb5I4W3mZDj04kKwnz6k_gpGCcs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:51:01,451:DEBUG:acme.client:Storing nonce: eFSVlf8UFTml1PX_ufZnfCHkKb5I4W3mZDj04kKwnz6k_gpGCcs 2024-07-08 16:51:01,451:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:51:01,461:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVGVG1sMVBYX3VmWm5mQ0hrS2I1STRXM21aRGowNGtLd256NmtfZ3BHQ2NzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Bj7RNvYz6IxygKZfcxC-OJAP1xfEnGjkSun7OG_6_-VWOI9YU62rDyV1quxsw9hdotUgEWGN4brQwseDnYtzxi2aAIuMZWzXHRhVyy9mAUIw63QfsX3IrubTtO3P89XxThb0eqxO5fMzJ1XWCW6gPi1aIdzmTnYGJTHe_cDQuAxbGSHIxLpnd8aWg6ERfaNc6XAY6gDqLwEYyj25uHS2UdTJIAsi-qWvw16NamF3vO6sgEai3uzzx2MC8U8nBJx0ksP9vzXAa2u2JvnPaUJT6lUUdS_wUqTFu7vu7vOqy0MNs5pr-ZlAfeBfIFsFDiLjRbR_0J9p5xwaC1rFRxyAGw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-08 16:51:01,645:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-08 16:51:01,646:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:51:01 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963320687 Replay-Nonce: zgT1AlV-aH2t-65FyePmdiFBbZZMOQXf3Rx0IH095_wQcB6H5_g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:30Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963320687" } 2024-07-08 16:51:01,647:DEBUG:acme.client:Storing nonce: zgT1AlV-aH2t-65FyePmdiFBbZZMOQXf3Rx0IH095_wQcB6H5_g 2024-07-08 16:51:01,647:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:51:01,656:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1hSDJ0LTY1RnllUG1kaUZCYlpaTU9RWGYzUngwSUgwOTVfd1FjQjZINV9nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0NTI5OTcifQ", "signature": "ryf85aQHsNPYETuuWaLbRaootOZY9p47jgBnjBLvFHjNJJIITaVZy4eDFOedD_patm49sHpOj7JdYpFytSk7ZIoDSV-qHtEK-veEo6SQbSomhesEsbqfD12GN-kIh0z4R7MEhQ80n3dFgKKuYEiOY0CL8_eE-CNoeJ-xUu23YHbReiTPKGdkG1MJ1WAgeywYOayaC0lpZdEpHRglalAU22POBy9HFZDW_8NN6nmdgSXHdcB7lNLFSkrtot_GXRuSeswrGEBQnrfNvb4jeij_ss876IvzM-lVUOdjV-YE7q0BHnZ7GKL2Ld2BEtP2rs2_1UW25FNAGGdYCeAhx_4vUg", "payload": "" } 2024-07-08 16:51:01,823:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123452997 HTTP/1.1" 200 810 2024-07-08 16:51:01,825:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:01 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-1WmHkO2ewp7y0BU6HqYBUtoSyVD67j58GOK69B8sfRY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:30Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/jVGASw", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/HCdluw", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/7JAHfA", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" } ] } 2024-07-08 16:51:01,825:DEBUG:acme.client:Storing nonce: zgT1AlV-1WmHkO2ewp7y0BU6HqYBUtoSyVD67j58GOK69B8sfRY 2024-07-08 16:51:01,826:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:51:01,827:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-08 16:51:01,828:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:51:01,828:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:51:01,830:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:51:01,830:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:51:01,830:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:51:01,831:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:51:01,833:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:51:01,890:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:51:02,085:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:51:02,086:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-08 16:51:02,087:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-08 16:51:02,091:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-08 16:51:02,091:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:51:02,092:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:51:02,097:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:51:02,097:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:51:02,097:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:51:02,102:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:51:02,103:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:51:02,106:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:51:02,545:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:51:02,546:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:02 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "zNWg6sMjomc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-08 16:51:02,546:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:51:07,540:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8285_key-certbot.pem 2024-07-08 16:51:12,250:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8283_csr-certbot.pem 2024-07-08 16:51:12,251:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:51:12,251:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:51:12,396:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:51:12,397:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqL-7yG3LOdYaD4jDNd2FUaFxa2mOlnyo-wkxJ5h8dmkU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:51:12,398:DEBUG:acme.client:Storing nonce: EPg6kJgqL-7yG3LOdYaD4jDNd2FUaFxa2mOlnyo-wkxJ5h8dmkU 2024-07-08 16:51:12,398:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:51:12,409:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FMLTd5RzNMT2RZYUQ0akROZDJGVWFGeGEybU9sbnlvLXdreEo1aDhkbWtVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fka8ZYm28E9XcbbZ__USvf6557YOfQyPBLXjhaM88Hax3IGKxvRLNbl_AHB_RaaTCBCd9hSlUk1xbqRsrVjXL_xQr8GppF317z1NrNN8R32b2_QAeZLYy50X78WVC0ngybQmTSkmLTf1ejYLSsrLZVA4km5hA2Y3TTjW_bycW8X4lxNuLVY67ahd7svSsHTr20d1vsLUX6P9-eaQ9jRWrDiysMX_zDVsI0IzzFI6UzoA00GrHFpo_CzaNEOzXVD-i8SvMbzsWpbN3m-SkXPa2PRFDC1c2zOb3Fe5D69A7RnO0GGsEXWKjya63ICowXQRHxE6qvVe2XLqRrSMwPUgZA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-08 16:51:12,567:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-08 16:51:12,568:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:51:12 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963348157 Replay-Nonce: EPg6kJgqx5POPsWVgaJhrySMmoZQ6VCTr74AsXVCTHzDlajQSmU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:40Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963348157" } 2024-07-08 16:51:12,568:DEBUG:acme.client:Storing nonce: EPg6kJgqx5POPsWVgaJhrySMmoZQ6VCTr74AsXVCTHzDlajQSmU 2024-07-08 16:51:12,569:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:51:12,575:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3F4NVBPUHNXVmdhSmhyeVNNbW9aUTZWQ1RyNzRBc1hWQ1RIekRsYWpRU21VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0OTU1NzcifQ", "signature": "wiRfyvYwn_ssuWI7zkcrCTjwCmymGPAU856LI4AWGyr514rhHJ5_ZTJMLSusuYY-bmi_x1ukv_PtfGayz1HjP1AOat31Osc0eM2xV7VLiYcS10ZmdrqlGebCFzRfe1nG2IFaW7m8sAjcOpImzLXF1kAjAzwkohtq3SYor-U64RrqRNV78ARb91dobQiSJmn4i0iY-I6vwdMLRnOzpyCyJrKrjY3_l5QpjDV73CP38Wfcvi0h_fToeX59FBz0U9maRIBbWZDNLsQJpJnlSS0a1TU2kSGNBFJxytZRBy-4VRC4I7gjGt8DEwgY6sf7DD_qrBEUUkftwJAlNmlBLvIjzA", "payload": "" } 2024-07-08 16:51:12,725:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123495577 HTTP/1.1" 200 809 2024-07-08 16:51:12,726:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:12 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqQYDCSntjhKCb_w_qBm_eN4cuWJ_d7H_hBYYDIbqYbFk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:40Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/CYYT4Q", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/HlKjqg", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/iwR44A", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" } ] } 2024-07-08 16:51:12,726:DEBUG:acme.client:Storing nonce: EPg6kJgqQYDCSntjhKCb_w_qBm_eN4cuWJ_d7H_hBYYDIbqYbFk 2024-07-08 16:51:12,726:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:51:12,727:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-08 16:51:12,728:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:51:12,728:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:51:12,729:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:51:12,729:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:51:12,729:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:51:12,729:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:51:12,731:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:51:12,794:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:51:12,978:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:51:12,979:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-08 16:51:12,980:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-08 16:51:12,985:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-08 16:51:12,985:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:51:12,985:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:51:12,991:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:51:12,991:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:51:12,991:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:51:13,000:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:51:13,001:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:51:13,003:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:51:13,445:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:51:13,445:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:13 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "2jzJdDEEXD8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:51:13,446:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:51:18,525:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8286_key-certbot.pem 2024-07-08 16:51:23,234:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8284_csr-certbot.pem 2024-07-08 16:51:23,235:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:51:23,235:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:51:23,381:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:51:23,383:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqmr695K_9BOxKoXPyPWoZjfzA1XeUZZpS3r9TyfBHM9w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:51:23,383:DEBUG:acme.client:Storing nonce: EPg6kJgqmr695K_9BOxKoXPyPWoZjfzA1XeUZZpS3r9TyfBHM9w 2024-07-08 16:51:23,384:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:51:23,393:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FtcjY5NUtfOUJPeEtvWFB5UFdvWmpmekExWGVVWlpwUzNyOVR5ZkJITTl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Pr7IGu7PE9JuBcD-WrA5cLtncOYDRqpWRA9o33unsCkMW_SSH8SuoLzDJl6LDTblUqd8zRWzy3P0tplGPjmISVVX4_DgOVS4cjm-t4bXAZzs70XNwsMJA_5VT6rzylT-8UqJqGdaBZB27VJzxe3iyCDGPGTj7caxygomhjeqtX2GMthh37KRO8E08oZm7P6Z_IM_K6K7rhZCE_XuYHFPLf047HHIEbcheYS_dzkI7HXZa4ZTJP-e6Muh3BWZi-ZQqwMaClL6sbH1xX4O95hWRoYD6RCHK4MnVsQU90pQ2SwxWH6f4JcdL_2Lg_UYw1YgJ8yxOgekTAW1UQGJSbM28A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-08 16:51:23,549:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-08 16:51:23,551:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:51:23 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963374667 Replay-Nonce: oPjXeLW6sscOSHlj39YBmzX03kLw_38aHadO80WZth8BuDsB15k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:51Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963374667" } 2024-07-08 16:51:23,551:DEBUG:acme.client:Storing nonce: oPjXeLW6sscOSHlj39YBmzX03kLw_38aHadO80WZth8BuDsB15k 2024-07-08 16:51:23,552:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:51:23,558:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZzc2NPU0hsajM5WUJtelgwM2tMd18zOGFIYWRPODBXWnRoOEJ1RHNCMTVrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1MzU4NjcifQ", "signature": "vykye9ubnzUDARPIBEABanmN-RIyBHrnK5DFpxZXil4JXcNEofFk00UGLeHLI-LfY4rA0lswWglZ0qsdJV8N6InGF7kHXXgk_YfliqZ2sJYx5nr9TYQvtRat8FYtC_EFbDlbxQI9IqOZsmx6QaVfNv8V-58NM-jneif9MZo2OAkI5j41KSp7kb6viwd3KbeVK__J9A2r6f1DqkQOihcSB2SjseWncRfjlHtWBMewB286FKIyPexRCCxLvfAlAbVWVa2v7ujWSAjdy0vHWmh8daQfIPrcHUv3B8BWaQG1jHusETtNYL0X4Nvml_f-zN0PbZOEbmOO2NZdu5ZCPEtU-w", "payload": "" } 2024-07-08 16:51:23,709:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123535867 HTTP/1.1" 200 805 2024-07-08 16:51:23,710:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:23 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqkXn1PR5HB_cniBSscwTuzcVY9jfmqCMXuu4CxMxfisQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:51Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/7949-Q", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/1xlmxg", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/Gfn7VQ", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" } ] } 2024-07-08 16:51:23,710:DEBUG:acme.client:Storing nonce: EPg6kJgqkXn1PR5HB_cniBSscwTuzcVY9jfmqCMXuu4CxMxfisQ 2024-07-08 16:51:23,711:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:51:23,712:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-08 16:51:23,713:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:51:23,713:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:51:23,714:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:51:23,714:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:51:23,714:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:51:23,715:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:51:23,717:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:51:23,767:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:51:23,965:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:51:23,967:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-08 16:51:23,969:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-08 16:51:23,975:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-08 16:51:23,975:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:51:23,976:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:51:23,981:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:51:23,981:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:51:23,981:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:51:23,999:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:51:24,000:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:51:24,002:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:51:24,472:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:51:24,474:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8hOyGGPQh14": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:51:24,474:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:51:29,664:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8287_key-certbot.pem 2024-07-08 16:51:34,348:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8285_csr-certbot.pem 2024-07-08 16:51:34,348:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:51:34,349:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:51:34,505:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:51:34,506:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-TZQvkDw4r5IxhazCp2axI83ZzjV8DknEvXB-HcAtekE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:51:34,506:DEBUG:acme.client:Storing nonce: zgT1AlV-TZQvkDw4r5IxhazCp2axI83ZzjV8DknEvXB-HcAtekE 2024-07-08 16:51:34,506:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:51:34,513:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1UWlF2a0R3NHI1SXhoYXpDcDJheEk4M1p6alY4RGtuRXZYQi1IY0F0ZWtFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "CFage6wZezCcV26nafCsByNLSoG_f4PxPRhhGP3u4sD97Ykl6C0pzsOX8One3yj91JoI6_VSg-rY-z9bL8fSZS-Jnl2DOZrP7oaDvXW31HTPv-2aQADOcMBxamAN2JY_oorvPjyvFBmRYaP4UeS6M7JwIOZpdivvNqzQ6llrwfi5yp1maaT9iXsg3_ZSFG7Ki0ysi66qG6FSRXhr8JNBYoCAgRDGvNTv9WI_DJH-H2NJWQt4XCZ5CafS88tGDbAIIovWTut8fkOXRQNswIEhGhQRNN9Z7vtZ0YKQKJnB1O9s1UyQLNvfLYmFYRdz8h7eLIsolZVWopEGxJX0qhNIEQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-08 16:51:34,692:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-08 16:51:34,694:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:51:34 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963400877 Replay-Nonce: eFSVlf8UudVmvyt7-gjrNFpvS3BejfwXC04QgB3VvTmPgXbq_dM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:19:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963400877" } 2024-07-08 16:51:34,694:DEBUG:acme.client:Storing nonce: eFSVlf8UudVmvyt7-gjrNFpvS3BejfwXC04QgB3VvTmPgXbq_dM 2024-07-08 16:51:34,695:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:51:34,703:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFV1ZFZtdnl0Ny1nanJORnB2UzNCZWpmd1hDMDRRZ0IzVnZUbVBnWGJxX2RNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1NzQzNDcifQ", "signature": "Z2uUyAUro3r8XjCIq5hwROg4GIxCUBjJy65dpqB1khpRoRHjziWwwHaiX8xM-3r6iya63kJ4IlkB41zUhvu2MGWF7LTdz-75iYZT0jmvgScZNBkP4xpCC_7hmhLC0D8iK00mshr93S2V6acPen20T0Z3tOqYDRvfcmwW_Ypkonz96YCA_KutX-jLBpgMbRZCMMOdb-YjR85P_MU-IjM2fqCQTWHKeG4pSRMwfrvtFJ9TeEnOikVXYva6EbnlRf-QsLj3P6JxBqwzeWtIqtj6edIo0j_nmzajstVpbJzyhEpFFUaUvuuvT6LdzhUwFui2kXYWWlYhyBW7rFOTKAk3mg", "payload": "" } 2024-07-08 16:51:34,864:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123574347 HTTP/1.1" 200 805 2024-07-08 16:51:34,865:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:34 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-yflHf3VvjMKQ-z2rRf4L2gqH3EKX8gSecX-Gu60YPe8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:19:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/NeAJIw", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/4slvLA", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/_5WNoA", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" } ] } 2024-07-08 16:51:34,865:DEBUG:acme.client:Storing nonce: zgT1AlV-yflHf3VvjMKQ-z2rRf4L2gqH3EKX8gSecX-Gu60YPe8 2024-07-08 16:51:34,867:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:51:34,867:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-08 16:51:34,868:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:51:34,868:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:51:34,870:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:51:34,870:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:51:34,870:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:51:34,871:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:51:34,874:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:51:34,917:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-08 16:51:35,121:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-08 16:51:35,122:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-08 16:51:35,123:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-08 16:51:35,127:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-08 16:51:35,127:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-08 16:51:35,128:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-08 16:51:35,133:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-08 16:51:35,133:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-08 16:51:35,133:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-08 16:51:35,149:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-08 16:51:35,150:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-08 16:51:35,152:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-08 16:51:35,597:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-08 16:51:35,598:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:35 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "dGMxexR_30Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-08 16:51:35,599:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-08 16:51:40,683:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8288_key-certbot.pem 2024-07-08 16:51:45,346:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8286_csr-certbot.pem 2024-07-08 16:51:45,347:DEBUG:acme.client:Requesting fresh nonce 2024-07-08 16:51:45,347:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-08 16:51:45,493:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-08 16:51:45,494:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgq0l3trn8F4dvT35LrShF4hIbyudRbxTFbL83tjymrxHc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-08 16:51:45,495:DEBUG:acme.client:Storing nonce: EPg6kJgq0l3trn8F4dvT35LrShF4hIbyudRbxTFbL83tjymrxHc 2024-07-08 16:51:45,495:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-08 16:51:45,502:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3EwbDN0cm44RjRkdlQzNUxyU2hGNGhJYnl1ZFJieFRGYkw4M3RqeW1yeEhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "di1hnEAglRUPDTEwQAhAqFcKIthNOiVgOJh24auO11cLSAmE1pPjBrwsRuPNe7Zp6qKQmbfmHPf3NRY3HFdHKFDTXxc79pbVDWw9F8c5Rf5DWWovrCeLtWM_pSQZs6IsY9HXG4esFCA4Ksf-_lPw_bYAsgsmWbzxufLct_9BnYiAChpisaRfL-tgadpOLBbUUSaL5TMYFEE4tlr7ifBcdLMEkKnrXzCylNvKp2IY490xrclwnrKnye0FnaP7Yu1yL-dtqbvCUn1qBd-Cm-8s4xqT_fneCKfZ8iKWrghvwSo5XnEpxuBqGgU40br4VbbjQtTVPAk7YOHIuTbKq4YevQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-08 16:51:45,676:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-08 16:51:45,676:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 08 Jul 2024 14:51:45 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963440917 Replay-Nonce: EPg6kJgqzB0hpr8WziD_yvsoagQDa7Vr9osPlf-bHxQBsC1znXM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:19:11Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963440917" } 2024-07-08 16:51:45,676:DEBUG:acme.client:Storing nonce: EPg6kJgqzB0hpr8WziD_yvsoagQDa7Vr9osPlf-bHxQBsC1znXM 2024-07-08 16:51:45,677:DEBUG:acme.client:JWS payload: b'' 2024-07-08 16:51:45,683:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3F6QjBocHI4V3ppRF95dnNvYWdRRGE3VnI5b3NQbGYtYkh4UUJzQzF6blhNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM2MzMxMzcifQ", "signature": "JixTWyXnXO5bU1ClCsDbY9HAoKsO02KaK9lxs3oGeJDk2d8pXpYrkrrndQZsptJc8TAlAMENGpGFsJ5AeQGjtQyioTP2AyzslifwelZ2g9xvGCszgdUQhdTp3CgtVW9r5HrXn3pDYTdq_u-OlTrKSB2n91fSFZtarvERs_PC-yUvmk_9O7OiCPjXxAqy3arHDqkmui3qJu3XJjwJR977ct9lDQHwSDdNrVX5OFM6I-_puOpU8ek9mnlJrMyGNTgH1ThupRdZhu8lzUpF7YzAR_-7daBpnf8nlk4GAgjJvpSer8uUEicUcIARx7nKr745ZPs45GWCHGDAwRDPqPUSZA", "payload": "" } 2024-07-08 16:51:45,833:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123633137 HTTP/1.1" 200 805 2024-07-08 16:51:45,833:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 08 Jul 2024 14:51:45 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqaMNMuhXIHPpuD2bTWYUeraXzbdTqxKJ-Xm-FIq5_uiw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:19:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/cKgBUw", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/fI1u_A", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/N6igCw", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" } ] } 2024-07-08 16:51:45,833:DEBUG:acme.client:Storing nonce: EPg6kJgqaMNMuhXIHPpuD2bTWYUeraXzbdTqxKJ-Xm-FIq5_uiw 2024-07-08 16:51:45,834:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-08 16:51:45,834:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-08 16:51:45,835:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-08 16:51:45,835:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-08 16:51:45,836:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:51:45,836:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-08 16:51:45,836:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-08 16:51:45,837:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-08 16:51:45,838:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-08 16:51:45,838:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-08 16:51:45,839:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-08 16:51:45,850:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 15 renew failure(s), 0 parse failure(s) 2024-07-08 16:51:45,852:ERROR:certbot._internal.log:15 renew failure(s), 0 parse failure(s)