2024-07-07 14:01:15,493:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-07 14:01:15,493:DEBUG:certbot._internal.main:Arguments: [] 2024-07-07 14:01:15,493:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-07 14:01:16,161:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-07 14:01:16,161:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-07 14:01:16,196:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-07-07 14:01:16,240:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:01:16,418:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:01:16,421:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-07 14:01:16,429:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-07 14:01:16,438:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-07 14:01:16,438:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:01:16,438:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:01:16,443:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:01:16,443:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:01:16,444:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:01:16,448:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:01:16,449:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:01:16,452:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:01:16,903:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:01:16,903:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:18 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "l9IHY_OT8Lk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-07 14:01:16,904:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:01:21,735:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8248_key-certbot.pem 2024-07-07 14:01:26,187:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8246_csr-certbot.pem 2024-07-07 14:01:26,188:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:01:26,188:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:01:26,335:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:01:26,336:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6NedtyA4h9jOJCNyrMWbNPdNvx3z6nMu5z4q9Qp6qySE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:01:26,336:DEBUG:acme.client:Storing nonce: oPjXeLW6NedtyA4h9jOJCNyrMWbNPdNvx3z6nMu5z4q9Qp6qySE 2024-07-07 14:01:26,336:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:01:26,342:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZOZWR0eUE0aDlqT0pDTnlyTVdiTlBkTnZ4M3o2bk11NXo0cTlRcDZxeVNFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "lr1QHTxe9QFH1t8CSLPqMz03fauQBvfmMzI8PyapXWh8WyoTUYGryFiC5wnmQwRK6WBtaf7VhZoRGUlkAIpS3DNxeiww3TWuByGp09_6LIzNJf8kYrIpzLs1SLmDZicgKPdRIQPFnSlg8qWMrQ-x0QYN0lzuLxGqBGIWT3nskE2lN6p0-K0esj_81H45aOaffG3f0p-isLJgh43FbCvR2R8JAoTdTxI42T1iXXtNP9oewt7roM3IfyMbzCJukX2ViLEr0XSDITiFNpenjVtNPhMkHyc77KV7NoRPMOFgkMV4jiVWi7bZ19dBAcx9hCtIOe_2NXABMsy_w4iE99bKUA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-07 14:01:26,500:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-07 14:01:26,501:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:01:28 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963066047 Replay-Nonce: oPjXeLW6yiEkxp7oW6FqIcT7EDWbu_tpMUFvyILm1LLrsKhSIgI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:05Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963066047" } 2024-07-07 14:01:26,501:DEBUG:acme.client:Storing nonce: oPjXeLW6yiEkxp7oW6FqIcT7EDWbu_tpMUFvyILm1LLrsKhSIgI 2024-07-07 14:01:26,502:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:01:26,512:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZ5aUVreHA3b1c2RnFJY1Q3RURXYnVfdHBNVUZ2eUlMbTFMTHJzS2hTSWdJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMwNjU5MTcifQ", "signature": "cktpADEnFbcLh_G_24v5ZyMftwUf44Av74nf32_kTFps9720clwaLJMcS4crlQXjGi4oEUr1uoQ7xdIFGoBoD02BhBqNRemjB1UAQZ4UjrH5mHIR9CWh1-bz5Eo5RqcyqzQ46WRBUMlYTjzwb5UQ0MUXkGjHMjaFPXbcLBjpx3YU6_o9w297CdZs51LXxFiS-s0WGRq334CiWh_DbOcI_YaVl4BZocgzBplSjJzDyK7xy_sqsyEh2zo_pKt-d7MM3ou5Xp5QQNTFQufDd8j_PC8BCOU_4W2Icl3o-eP1HvE46Vf44uAGzzdw0q085S9Q1WmcBpafwT2dF8psptpJew", "payload": "" } 2024-07-07 14:01:26,662:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123065917 HTTP/1.1" 200 810 2024-07-07 14:01:26,663:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:28 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW67w_8xhKiAGn_oyVY89pKyqz9SOSphqey9uyXrb1P37A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:05Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/AopFCQ", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/xbrZjg", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/2pJhlw", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" } ] } 2024-07-07 14:01:26,663:DEBUG:acme.client:Storing nonce: oPjXeLW67w_8xhKiAGn_oyVY89pKyqz9SOSphqey9uyXrb1P37A 2024-07-07 14:01:26,664:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:01:26,664:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-07 14:01:26,665:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:01:26,666:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:01:26,671:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:01:26,671:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:01:26,672:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:01:26,673:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:01:26,679:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:01:26,718:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:01:26,749:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:01:26,751:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-07 14:01:26,752:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-07 14:01:26,756:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-07 14:01:26,756:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:01:26,756:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:01:26,761:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:01:26,762:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:01:26,762:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:01:26,766:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:01:26,767:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:01:26,769:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:01:27,246:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:01:27,247:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Ib_-DpprJUo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-07 14:01:27,247:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:01:31,963:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8249_key-certbot.pem 2024-07-07 14:01:36,323:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8247_csr-certbot.pem 2024-07-07 14:01:36,324:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:01:36,324:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:01:36,483:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:01:36,484:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-qIrYw4lKIHbFpmP5gVxKQTN27ByTuJW7hzFX_r1h2ZU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:01:36,484:DEBUG:acme.client:Storing nonce: zgT1AlV-qIrYw4lKIHbFpmP5gVxKQTN27ByTuJW7hzFX_r1h2ZU 2024-07-07 14:01:36,484:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:01:36,492:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1xSXJZdzRsS0lIYkZwbVA1Z1Z4S1FUTjI3QnlUdUpXN2h6RlhfcjFoMlpVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mjnEslbI9WTZvq9tEOUkKwIgGp0JD8Ynfq4L9FZxAx0I_kclIGB-zq2NdlfCQ8uC13z0TVLTXXE0Ms4r1ewFMzymfnSxa6OYH53Fa3sSxyqujy4DEEBQJscTa_LTYhvFfr6pZDHUkBoEVGwMCKjsgVQsJf_iCwJaMfQONrGBYfOSOkbTbSXd3VtnWxYhGtZkt2JWLDHU4xR8TvFuIsMxWX0d8sWqC4Cnx9r2IvpBviMKFCNlvw91_kTEot5ZbduZReUQzIvtlJ1lWoYzWcp61sYYWaGEvbUriQMcS3r-oxaoqK7qMz0ivwHij7AA7xAbWLC14H2QttOV7FQjuMEQAA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-07 14:01:36,691:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-07 14:01:36,692:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:01:38 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963103477 Replay-Nonce: zgT1AlV-DxonPPgl13l2t40nPSKw10JLGZSXulfInqc2MqNAEaA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:16Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963103477" } 2024-07-07 14:01:36,692:DEBUG:acme.client:Storing nonce: zgT1AlV-DxonPPgl13l2t40nPSKw10JLGZSXulfInqc2MqNAEaA 2024-07-07 14:01:36,692:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:01:36,698:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1EeG9uUFBnbDEzbDJ0NDBuUFNLdzEwSkxHWlNYdWxmSW5xYzJNcU5BRWFBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxMjE5NjcifQ", "signature": "hNG9X_AMAYg9R0KDUdxc8CizO1eseqafz1XS3VPHCWco0kYaqb2VPRk9ueKeDTw02wAFiSA_Wsl71QZP6lgMNjOskfuFXDvJgpZQTViOPmR6EBHN_4wEMaVPZrVCKPXjADyFsjv3eG0RU9L-UJZlvNA19pS5wNPZW1NfJg4HKQYl0-xSR03t-A4xAl08OM-XLg8MaZsZLfyS-_5AoqxMtT46h-Dfp4doIRIJopOXwSAw0x2YNzn2qAc37ygx76KZVlJdDTh4RmcPFhvHngws594HCA4C4TVJSDC1an38udHfZkIWXj2asJ1yvWrq99fswtXq05KgZUPg0HMcahnROQ", "payload": "" } 2024-07-07 14:01:36,864:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123121967 HTTP/1.1" 200 804 2024-07-07 14:01:36,865:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:38 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-1VurCtFiul7gN-5C-D0cISh-CV0oMiegvxHX0HC9jDA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/Ag883A", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/g4f58w", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/s77iUg", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" } ] } 2024-07-07 14:01:36,866:DEBUG:acme.client:Storing nonce: zgT1AlV-1VurCtFiul7gN-5C-D0cISh-CV0oMiegvxHX0HC9jDA 2024-07-07 14:01:36,867:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:01:36,868:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-07 14:01:36,868:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:01:36,869:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:01:36,871:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:01:36,871:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:01:36,871:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:01:36,872:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:01:36,875:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:01:36,924:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:01:37,029:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:01:37,032:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-07 14:01:37,034:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-07 14:01:37,041:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-07 14:01:37,041:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:01:37,041:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:01:37,046:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:01:37,046:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:01:37,047:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:01:37,051:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:01:37,052:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:01:37,054:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:01:37,501:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:01:37,502:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:39 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "xjkz9C0Fb4g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-07 14:01:37,502:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:01:42,324:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8250_key-certbot.pem 2024-07-07 14:01:46,701:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8248_csr-certbot.pem 2024-07-07 14:01:46,701:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:01:46,701:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:01:46,853:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:01:46,854:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6Q_RKNDbGIzsd-EwD-FUkmQtv9hn7Begk_BCPmmybzWk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:01:46,854:DEBUG:acme.client:Storing nonce: oPjXeLW6Q_RKNDbGIzsd-EwD-FUkmQtv9hn7Begk_BCPmmybzWk 2024-07-07 14:01:46,854:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:01:46,861:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZRX1JLTkRiR0l6c2QtRXdELUZVa21RdHY5aG43QmVna19CQ1BtbXlieldrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qe1QFOVG8yOLTslrOQphnkdYlL8ncKNmU_Wq47VX4Q8eSClRkWrJ3_a_YGtXHV32C2CrPPzuVAiq-G35TkhJwWNUBj3r2-r7ZUh1HTuC00VIs6wNkLra6SLn25CKWUUDTj-ljsOml5djRmBw-uV5IxrJtt_YImANloNJI79nUsB3E8De7hBE_Vz2TYlxeDUXn6UxqTm1boZwR7j-cBrG7e5MrlJZ1Fm8u1PvhitT2iPS0I7nw_ITivUlDOdUCBcz6eOUn5H_jIrrRQr9i5dxdqtLCGCK7qPFW8zEg3W7kx_p9vyEH_ZPKFYGr4TET5BraYTkE3MdZQkSZUHpv_jshA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-07 14:01:47,082:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-07 14:01:47,083:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:01:48 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963135847 Replay-Nonce: oPjXeLW69QzRbQ5p2PBrVyr-81cFqwMCp6NY0VQ352jTkhg6_08 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:27Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963135847" } 2024-07-07 14:01:47,083:DEBUG:acme.client:Storing nonce: oPjXeLW69QzRbQ5p2PBrVyr-81cFqwMCp6NY0VQ352jTkhg6_08 2024-07-07 14:01:47,083:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:01:47,089:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzY5UXpSYlE1cDJQQnJWeXItODFjRnF3TUNwNk5ZMFZRMzUyalRraGc2XzA4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxNzEwOTcifQ", "signature": "gGsLehRjSLmeV8y2PkAJ_lxc2--9QUxiIq2_P4TWHmQu4grOK13dQsSLeoAiYBd8F_Ddoq-tyacMcH9yR_G5I9PB_ZzaVEFTp5PE2MQf6IXP5_E5iquOGZ9cxvh8fOJ8w0S6a4jf0IfMCvFPHmCTDGAQ_1gMI-ZOGUIvljx_aI4sIWFD5xedByMD72_K3puHmV9arZUojwYPwbil_bxKWH-Yu22KZsWO8ic6rZR1CF19KQJXRw2EkT3nPs4_NNuatkCwim4-A_0aulAp-0FN8AWFXvPKmeW1WC0wl4TIGKWRp0qHzzDVt3Hk3RsisYgFOpcp1HdcAPo3YzWu5hRTuA", "payload": "" } 2024-07-07 14:01:47,257:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123171097 HTTP/1.1" 200 807 2024-07-07 14:01:47,257:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:49 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6aNjmUjwLBIPpIF2nMniE9RNdc0oGJUQsDwT-Pp-LG0U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:27Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/vQZynA", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/XD91Zg", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/qlRt6w", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" } ] } 2024-07-07 14:01:47,258:DEBUG:acme.client:Storing nonce: oPjXeLW6aNjmUjwLBIPpIF2nMniE9RNdc0oGJUQsDwT-Pp-LG0U 2024-07-07 14:01:47,258:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:01:47,258:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-07 14:01:47,259:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:01:47,259:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:01:47,260:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:01:47,260:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:01:47,260:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:01:47,260:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:01:47,261:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:01:47,310:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:01:47,476:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:01:47,477:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-07 14:01:47,478:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-07 14:01:47,482:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-07 14:01:47,483:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:01:47,483:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:01:47,488:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:01:47,488:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:01:47,488:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:01:47,493:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:01:47,494:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:01:47,496:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:01:47,975:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:01:47,977:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:49 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "KYADIb8ENwc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-07 14:01:47,978:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:01:52,533:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8251_key-certbot.pem 2024-07-07 14:01:56,903:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8249_csr-certbot.pem 2024-07-07 14:01:56,904:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:01:56,904:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:01:57,065:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:01:57,066:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-7fQP5m_vzh5Lq7dmeeSccNkm-kp_V00t0HvuU4qqtWM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:01:57,066:DEBUG:acme.client:Storing nonce: zgT1AlV-7fQP5m_vzh5Lq7dmeeSccNkm-kp_V00t0HvuU4qqtWM 2024-07-07 14:01:57,066:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:01:57,076:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi03ZlFQNW1fdnpoNUxxN2RtZWVTY2NOa20ta3BfVjAwdDBIdnVVNHFxdFdNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SWjlozWqH60-kRtwN155BRBc2F6XCdlAWEDMWpDobMJSjpI1JsQQ0UVKX_Bv3VGt-p4OlmdaI7mbbKYjFC6NJaxF_6YzAtZ2c4tsw51JTvQtQ4o8YMw7zSSbN8E-bH72GPv3bixhyIUjY7umx837mfU9Q_1kC5HXdpUdQCTeYmbqa18oeqtsdqloA4rReV6-sDNYBQDOt5ec0cNvKgvUBnjW9pp2HMiZQzB_wLRUTZEAH5z8k72E9sQwjTdMdlo_WZVCfucCdBjhY2V7SLRrrvOd3fz8p8M1T9xY7Jp49RFJvZ_Tbi84aL2xDSpMlMmEvBN6bR_aC5npmIHqpAvxYg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-07 14:01:57,265:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-07 14:01:57,266:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:01:59 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963164787 Replay-Nonce: eFSVlf8U8tTyfI18b75Pjxixmw6hQ8nX7C4EPtRB_GVxONg206A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:38Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963164787" } 2024-07-07 14:01:57,266:DEBUG:acme.client:Storing nonce: eFSVlf8U8tTyfI18b75Pjxixmw6hQ8nX7C4EPtRB_GVxONg206A 2024-07-07 14:01:57,267:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:01:57,274:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFU4dFR5ZkkxOGI3NVBqeGl4bXc2aFE4blg3QzRFUHRSQl9HVnhPTmcyMDZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyMTQ1MzcifQ", "signature": "gEi9ZOQOqDHu7YNhf93en4NE3W1j8BIN8IIQ0hqZcVTghCVR58v0qzX0ezkyCmmigLJlAXBGF0JmauAK3xwEdNPWQau1hZKUzkiW5kPQKYdcUwnbO3Rs4qkQ8Ybiae6p_GfMN2FNGjfAMspHNBuN1vT2Vy6EeqxyTIHIoKMEVkRETlQduNfTvNOXReZwjDFTXEVYJB6b3tocF_ODMw8UoTLFMweoy0tpR11dpvTSJAO8Iz-Ep5xLBVFtp1ZpqOxjPUUgM-XtmdvhQvkJu5ZD_tU0ZpOo28uWE6DSBH51ixeunHnzyHriZ7RgzoRMMlPmArldJtuaEWnX1eDEXnUZbg", "payload": "" } 2024-07-07 14:01:57,441:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123214537 HTTP/1.1" 200 801 2024-07-07 14:01:57,442:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:59 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UuuLTQI_LP4rTakW0aE0a7J-M77kMGtqVDrhHHkujCDA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:38Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/FMZRsw", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/6lpfOw", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/gp7pwg", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" } ] } 2024-07-07 14:01:57,443:DEBUG:acme.client:Storing nonce: eFSVlf8UuuLTQI_LP4rTakW0aE0a7J-M77kMGtqVDrhHHkujCDA 2024-07-07 14:01:57,444:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:01:57,444:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-07 14:01:57,445:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:01:57,445:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:01:57,446:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:01:57,446:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:01:57,446:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:01:57,446:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:01:57,447:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:01:57,502:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:01:57,558:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:01:57,559:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-07 14:01:57,560:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-07 14:01:57,564:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-07 14:01:57,564:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:01:57,565:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:01:57,569:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:01:57,570:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:01:57,570:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:01:57,574:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:01:57,575:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:01:57,577:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:01:58,057:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:01:58,059:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:01:59 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "BgeN3lGBk9o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-07 14:01:58,060:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:02:02,933:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8252_key-certbot.pem 2024-07-07 14:02:07,295:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8250_csr-certbot.pem 2024-07-07 14:02:07,296:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:02:07,296:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:02:07,460:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:02:07,461:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-7neQ57IEYtqFueMkpT9gIvDTZ_qhEd1CChbAyh3Ovcc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:02:07,461:DEBUG:acme.client:Storing nonce: zgT1AlV-7neQ57IEYtqFueMkpT9gIvDTZ_qhEd1CChbAyh3Ovcc 2024-07-07 14:02:07,462:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:02:07,467:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi03bmVRNTdJRVl0cUZ1ZU1rcFQ5Z0l2RFRaX3FoRWQxQ0NoYkF5aDNPdmNjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "G93_awdMTINHCI1qf9uG1NhtDGAuWx1Or_SLENFCdZXIoGjwz-zJ0FIHG3YSJi6rGg7thxuKNPD6TJX1Hf8L3MPHmgICKwtmZFXBefGXf4cKz0qoJIdZObuwko7WjR5evfL_ga8wjt76wA909Crz9sh0vxRnxRHPNJu38UTnWqfmYqE1CXfPFaZR-pTFty1axdboGUDpryx0UHfQSXo6FFl-B9FnEROxnAI8lZZqc8hRZkBHcvebl4pEkFlC2LiQk_6r4nGtPc7RTwZnT1l4hdwLJOYDpBaL-7ubzcp_q4r_-qSijd9aH2I-jfX2CqNc_Lib18BwE5Sh-m1xJdL9PA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-07 14:02:07,688:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-07 14:02:07,689:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:02:09 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963193117 Replay-Nonce: eFSVlf8UcFNIBjwGJN01s-K3ZO6juRl16FY4rVSF0GbfzJZVheY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:49Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963193117" } 2024-07-07 14:02:07,689:DEBUG:acme.client:Storing nonce: eFSVlf8UcFNIBjwGJN01s-K3ZO6juRl16FY4rVSF0GbfzJZVheY 2024-07-07 14:02:07,689:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:02:07,695:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVjRk5JQmp3R0pOMDFzLUszWk82anVSbDE2Rlk0clZTRjBHYmZ6SlpWaGVZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyNTgyNzcifQ", "signature": "lK3bex19nzjuN-jDtaSXfGBAChqkr1OSMhUToInXD-dGC15va_leVd_MowUw1-b67Oyg167z9UJEia8Oo4Aqy7pxxw3DuftFWyexVyQdO68fLAT_LXDHkKOyC6KTPAdSqYQoLOylUYKLIRyNXYCX8C2HyPzRMEsKE3mWDE4dRiEb5d40wOai1ZjtDp6s1xSjEIFtp0H8LAhlvaXhM0nawGkN9mT4-sM47bQyT7HEe1WX_aRhqRm0R2h2BwPEYhqKF5ADisPM5m1RmDAuYKTN90bvVKOOMWGTaut3d2oqlEBFhXocTiO9ULT9GeM4hLVehBhH6Sbjjf2B5bmrbbz-Rg", "payload": "" } 2024-07-07 14:02:07,860:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123258277 HTTP/1.1" 200 805 2024-07-07 14:02:07,861:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:09 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8U-DGDIKk-MlYT14wF1IrDvWR1fSLPn0Pz2xPncrxM7Es X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:49Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/7Y8QQA", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/6IRQnQ", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/ZS_Kuw", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" } ] } 2024-07-07 14:02:07,861:DEBUG:acme.client:Storing nonce: eFSVlf8U-DGDIKk-MlYT14wF1IrDvWR1fSLPn0Pz2xPncrxM7Es 2024-07-07 14:02:07,861:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:02:07,862:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-07 14:02:07,862:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:02:07,863:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:02:07,863:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:02:07,864:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:02:07,864:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:02:07,864:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:02:07,865:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:02:07,904:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:02:07,941:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:02:07,942:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-07 14:02:07,943:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-07 14:02:07,947:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-07 14:02:07,947:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:02:07,948:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:02:07,953:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:02:07,953:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:02:07,953:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:02:07,958:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:02:07,958:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:02:07,960:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:02:08,410:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:02:08,411:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:10 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "35Zdvk8qR0o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-07 14:02:08,412:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:02:13,030:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8253_key-certbot.pem 2024-07-07 14:02:17,388:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8251_csr-certbot.pem 2024-07-07 14:02:17,388:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:02:17,388:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:02:17,539:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:02:17,540:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgq_2rZaYU6yr93XZcJouuXO0sljdopwHsrztYIgOTECY4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:02:17,540:DEBUG:acme.client:Storing nonce: EPg6kJgq_2rZaYU6yr93XZcJouuXO0sljdopwHsrztYIgOTECY4 2024-07-07 14:02:17,540:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:02:17,546:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FfMnJaYVlVNnlyOTNYWmNKb3V1WE8wc2xqZG9wd0hzcnp0WUlnT1RFQ1k0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BF0-Yh3Wsvbgj5jR16GR7KaxB2FaIazLL7jjX8e_tijIK-zk7Sfk3n8mlhCiRYKhyUN9wnXytWcH6vByuxyjWX3a0kUpfIdzj0Vo_vPU3oHczDlvt8_DSbFkUIngCpix1ywzgFcLZqiEeCNCIWXPyKv8tCw0sjZERLS1ERpaADwQCNEFOqeagYeDLqMgaKFmMVmMYj0O4P4aFX09a6fvJO7aUio7XxRztoAuKKVXb-8hDdqJDu7Ae5Z-OJPPCq2r9BvMT17uKLhLHaZtPFjZp8djAl9-8Q1fwFVOBHVMniQ9CW8ZT4gAZDfNLaydBNn6tY4BZ_tuWhabvXNP7qGbMA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-07 14:02:17,719:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-07 14:02:17,721:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:02:19 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963222697 Replay-Nonce: EPg6kJgqPUm_GccQF_j6jisYIFmgSzrFk7PyQN_WKNeg-radXOY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:59Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963222697" } 2024-07-07 14:02:17,721:DEBUG:acme.client:Storing nonce: EPg6kJgqPUm_GccQF_j6jisYIFmgSzrFk7PyQN_WKNeg-radXOY 2024-07-07 14:02:17,721:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:02:17,727:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FQVW1fR2NjUUZfajZqaXNZSUZtZ1N6ckZrN1B5UU5fV0tOZWctcmFkWE9ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzMDE4NjcifQ", "signature": "Qnwqt0VaMXdeokg8L_WprAQzao_JYA2PGSqblfp6JWA5_Pgq_g_9gTEBosJUEgrqJM-IeR9xWv5fP7_aYCxnMU2UmcGM-9hxIf1DgoY7Xwi3RKtFtCnZbzJrSZt9_uSwKcUgn4-amFajTfdu-gVbSSnat32HJQs70EqJRV7p1szHNHCaRNslI2nzn2s3gtkCnlISjRJCZ1E5UMa2gzsGPok6XO6zK1DSsXtOTjs93EdhSkTWbAQ2CScCJDB0-OUbOm5rg6cTghv-YjfI7fBZ_eWjavyb7ISGSyT33zC2Y3Ld6kn-ZD3GX__AHpmoY2wcWxK5Cq3eoF33pNwvmPROZg", "payload": "" } 2024-07-07 14:02:17,894:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123301867 HTTP/1.1" 200 809 2024-07-07 14:02:17,895:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:19 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6FqayJ1yuXlrXoG9ZVvREiHwI1Jv14NCMSYKH-WXilvQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/VjMp2w", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GGZVqQ", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GI9X-A", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" } ] } 2024-07-07 14:02:17,896:DEBUG:acme.client:Storing nonce: oPjXeLW6FqayJ1yuXlrXoG9ZVvREiHwI1Jv14NCMSYKH-WXilvQ 2024-07-07 14:02:17,897:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:02:17,898:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-07 14:02:17,898:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:02:17,899:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:02:17,900:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:02:17,901:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:02:17,901:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:02:17,901:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:02:17,903:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:02:17,949:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:02:18,028:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:02:18,030:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-07 14:02:18,032:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-07 14:02:18,038:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-07-07 14:02:18,041:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:02:18,080:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:02:18,154:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:02:18,156:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-07 14:02:18,158:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-07 14:02:18,167:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-07 14:02:18,167:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:02:18,168:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:02:18,173:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:02:18,173:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:02:18,174:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:02:18,179:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:02:18,180:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:02:18,182:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:02:18,661:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:02:18,662:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:20 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ScpI56SLcSU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-07 14:02:18,662:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:02:23,297:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8254_key-certbot.pem 2024-07-07 14:02:27,671:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8252_csr-certbot.pem 2024-07-07 14:02:27,671:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:02:27,671:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:02:27,833:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:02:27,834:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UX8oHacRRv1yTWg8aj2BGslxfN2oKro4sLGIwy90oatU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:02:27,835:DEBUG:acme.client:Storing nonce: eFSVlf8UX8oHacRRv1yTWg8aj2BGslxfN2oKro4sLGIwy90oatU 2024-07-07 14:02:27,835:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:02:27,847:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVYOG9IYWNSUnYxeVRXZzhhajJCR3NseGZOMm9Lcm80c0xHSXd5OTBvYXRVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NLQo-F3ZVJd1AcKbQIfM70LgV848loaZQzrg5pUOz0jhyiBg71Asd8_N6K-XjFeoqsD-XxbSoNpahCHOCI6m29rDC7eG0YH87f46oK8UpBNl2DGjIh1Y9zIeD4Zwm6Qg7iueVN39oyJ6W_M0rdGh-lnjemzk0ri7izrDqz7xLtzeDHL4im0yX8P2Rv5B4WPKEQqX_mwpJ_jgr8pG9XtlaEMPQs4TtKGK1haxfU3xxEFznzDLW3f-LvsodXytxJJigBGiC0bFvvFqLtiZJZsrSuM377o-Jz64Oa32fIFs0WlpuknJxC5Wp_5ayBW1Oxw4zYUlseVqAFcsghjToU6tEw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-07 14:02:28,030:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-07 14:02:28,032:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:02:29 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963261767 Replay-Nonce: zgT1AlV-LTjk7syOT9_3001NrvWdFnQE6ZuVXW9ZcShO1np_cjc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:10Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963261767" } 2024-07-07 14:02:28,032:DEBUG:acme.client:Storing nonce: zgT1AlV-LTjk7syOT9_3001NrvWdFnQE6ZuVXW9ZcShO1np_cjc 2024-07-07 14:02:28,033:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:02:28,045:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1MVGprN3N5T1Q5XzMwMDFOcnZXZEZuUUU2WnVWWFc5WmNTaE8xbnBfY2pjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzNTc4NjcifQ", "signature": "OhUND2F_G-7C2S1AjVqODhjuSDebEmiHTTuSrw18U1nPl7fRJC-WOuo881WYdkPYqA9jUv4P6j57MNyygx_CTWTTbX9nGZ21bz70GP4_5a_kFIn4hto10N9zhmKgipiDbDnk3mkrM3lznxyseBv4XRjcAQHXlTs_AZ4WMYSN1Uy9poPe0Qgplff-ZNHFOf0D5B5o8xasGR573pVTRiqb1HlUBma_puySqZ-5uG7pooqmVDZE9A6QagHIaOLroS9noUF5o0XP4cIrPrK8RkTqIP8movr2GLEyqdyUqq8sozcYH_1PgCTvyrhxtFHXqVex9QvDOBMEPdJwn1xkhAtHNg", "payload": "" } 2024-07-07 14:02:28,214:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123357867 HTTP/1.1" 200 806 2024-07-07 14:02:28,215:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:30 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-FOqMt31Ou1esqRfEqV2C5CNhr1-TJOlLBcVyWmbtN4U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:10Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/mRUn6w", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/Flovww", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/ejtuAg", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" } ] } 2024-07-07 14:02:28,215:DEBUG:acme.client:Storing nonce: zgT1AlV-FOqMt31Ou1esqRfEqV2C5CNhr1-TJOlLBcVyWmbtN4U 2024-07-07 14:02:28,216:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:02:28,217:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-07 14:02:28,218:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:02:28,218:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:02:28,220:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:02:28,220:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:02:28,220:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:02:28,221:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:02:28,222:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:02:28,269:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-07 14:02:28,269:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:02:28,270:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-07 14:02:28,276:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-07 14:02:28,279:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-07 14:02:28,279:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-07 14:02:28,279:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-07 14:02:28,279:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-07 14:02:28,281:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-07 14:02:28,320:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:02:28,371:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:02:28,372:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-07 14:02:28,373:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-07 14:02:28,378:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-07 14:02:28,378:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:02:28,378:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:02:28,384:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:02:28,385:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:02:28,385:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:02:28,389:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:02:28,390:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:02:28,392:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:02:28,831:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:02:28,831:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:30 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "rNg2_JHYP_I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-07 14:02:28,832:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:02:34,089:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8255_key-certbot.pem 2024-07-07 14:02:38,458:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8253_csr-certbot.pem 2024-07-07 14:02:38,459:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:02:38,459:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:02:38,604:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:02:38,605:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6zDIFY8Kb1V5uTgNbiGI0UK1f0XuZ-QlvB--_ns8DRsk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:02:38,605:DEBUG:acme.client:Storing nonce: oPjXeLW6zDIFY8Kb1V5uTgNbiGI0UK1f0XuZ-QlvB--_ns8DRsk 2024-07-07 14:02:38,605:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:02:38,611:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZ6RElGWThLYjFWNXVUZ05iaUdJMFVLMWYwWHVaLVFsdkItLV9uczhEUnNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "R5AEWtaAvGDHPVRhaXu0rotVrH4GipCFqr7Uvza290nwyzmAmrNB6T-jbUR76uj79CYpUa0Kr4-nO7KTQgmSqvbzMAABzmgGqRHE6vW-nU05ngiJg-MAWcehdlU0obnEp7uAZ6ipO1NCEjEhXZF1Qu64U-CobyhJZZrVtwF7Hf3vcrto0NjRnJsSim3zvTN807CH5v2srYxIwXYuHtnTL17Hm3eXxSUmDdn5f-Dg2fZgCCMkfpS-YsfwOcLqdghXuiq35mK2kZWMphLLmpr0lDkXeh5Nu0lSkeGxkN5h7L-bh5uHvdYaBRF8StF6ISKrjkf4B-4ynaKwFltx6h2JUw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-07 14:02:38,766:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-07 14:02:38,768:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:02:40 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963292297 Replay-Nonce: oPjXeLW6MX0FAFSm9ssy5_W398hB70gh26nz4zpaPgYCJ5ONgg0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:20Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963292297" } 2024-07-07 14:02:38,768:DEBUG:acme.client:Storing nonce: oPjXeLW6MX0FAFSm9ssy5_W398hB70gh26nz4zpaPgYCJ5ONgg0 2024-07-07 14:02:38,769:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:02:38,781:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZNWDBGQUZTbTlzc3k1X1czOThoQjcwZ2gyNm56NHpwYVBnWUNKNU9OZ2cwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0MDc1OTcifQ", "signature": "iVnCx5zvvQPVT1hcNwVyraEm4ZO7zjNzX3QdJuV3bDR48MCzyAkVALNXJSmQZ6HnQ6DqPpUxdjqLLxdjKoSILhCOWepEx81Av6cA7xDbsooRwbEksBkQ2s1Oc_3FiqMOXkMlTccZRRkEQ4JtDO9LyKhlOLuRvEl6AvxJ2PCaciiOwBx_KNgWuqgUcRhCn_DK0Fi6zkvptlYda2WKRJ5B8AS5oxbwt1y-9LlMJPx6viDoKJVlZZANqQfd5wXtauhxmnwB0JdFImQQgwhOXweisAkjrV88M3t6j2NP2-52uWdwFeACXvuFC1_IChAAef-NH-qjBq11W0RPWeXBeM5Fig", "payload": "" } 2024-07-07 14:02:38,930:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123407597 HTTP/1.1" 200 811 2024-07-07 14:02:38,931:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:40 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6yt1qIEyAlP0UxjLlZBihbPeRSmvMQmILVraULF0PhXM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:20Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/PlHedw", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/IGmPMQ", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/vPSuUg", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" } ] } 2024-07-07 14:02:38,931:DEBUG:acme.client:Storing nonce: oPjXeLW6yt1qIEyAlP0UxjLlZBihbPeRSmvMQmILVraULF0PhXM 2024-07-07 14:02:38,932:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:02:38,932:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-07 14:02:38,933:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:02:38,933:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:02:38,934:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:02:38,934:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:02:38,934:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:02:38,935:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:02:38,936:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:02:38,982:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:02:39,007:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:02:39,008:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-07 14:02:39,009:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-07 14:02:39,013:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-07 14:02:39,014:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:02:39,014:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:02:39,019:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:02:39,019:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:02:39,019:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:02:39,024:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:02:39,024:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:02:39,026:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:02:39,477:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:02:39,479:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "C06ReDu9_EA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-07 14:02:39,480:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:02:44,338:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8256_key-certbot.pem 2024-07-07 14:02:48,686:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8254_csr-certbot.pem 2024-07-07 14:02:48,686:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:02:48,687:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:02:48,835:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:02:48,836:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW63HBacAchTZWv-2Dr4fFeI7eMLZNuMtHKH7LO80I8RHY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:02:48,837:DEBUG:acme.client:Storing nonce: oPjXeLW63HBacAchTZWv-2Dr4fFeI7eMLZNuMtHKH7LO80I8RHY 2024-07-07 14:02:48,838:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:02:48,848:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzYzSEJhY0FjaFRaV3YtMkRyNGZGZUk3ZU1MWk51TXRIS0g3TE84MEk4UkhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MKuRixepjq31r_niLDwrNxgiYhEa5X9yrWJwQATP-9fmyObCqVEBUunPAXMhWwHEkBbYM6ti9UP9cZxhFFQJsTc4GQH3xBTpkxGM5zJvQ7aB278tHWb69I4My-B-kGXQ_8msb8B0oTmoIUb3Ny2xqJ8SJT8vaOcTAHyMhbjlVGDtjEevJDUBraMtIGM7IVzRUEsCoixQ-nt84_QUvuqc4XW8dWuF3So1XEiwB9OZkL4CHpDvBFU3pIW7niuJOJ3DXDR-ptzt-4abqddlgMlXxHaKuPRH5SGPfCnjeWV-JPkiA0Tk_5z_M1kD7QB9A03Ggtb2Ya0tjYjnAkMJ1Op07g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-07 14:02:49,022:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-07 14:02:49,023:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:02:50 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963320687 Replay-Nonce: EPg6kJgqT2P43EJFW-kz0H2Yoz3rDKZr6nk6yH3Kw_ccM3Vytfw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:30Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963320687" } 2024-07-07 14:02:49,023:DEBUG:acme.client:Storing nonce: EPg6kJgqT2P43EJFW-kz0H2Yoz3rDKZr6nk6yH3Kw_ccM3Vytfw 2024-07-07 14:02:49,023:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:02:49,029:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FUMlA0M0VKRlcta3owSDJZb3ozckRLWnI2bms2eUgzS3dfY2NNM1Z5dGZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0NTI5OTcifQ", "signature": "h6cSJaO9KbpLvr8FC3mdnmCH9CZDUjQ0sNtZ6dIDTB68xMrgKiy59i0dQ7lFYaXyR8HhdvoVOLWulDEdaX1V5Y6rR5NzHPsVsxu3kgY1BpZodxN8IYP46U7fXLLu5DAp2sV1cbNy2dz9MsrMlzWroGt2vRH3hD4_H8BDCB7Im7hzXDFskEJ8Ozu8qjqTgjkd4z2onUA9vsFWQYAigkYfa-bYd3aNKviYn_Cv9tEcgZBtziAl6vOaE0qgQ6Vwvr8zKywI-nmrlP5DCNMaNlYYsKx7NH7Ui2ii9oUbFoK44_DFOsycByXVMnHF3j4-gkX0RwJvMP1Jj4_rUudDX1EqtQ", "payload": "" } 2024-07-07 14:02:49,182:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123452997 HTTP/1.1" 200 810 2024-07-07 14:02:49,183:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:51 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqZDkALFqXbmcf0a87G1nPdr9-qDmItu8qKSrvVpQWb8I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:30Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/jVGASw", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/HCdluw", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/7JAHfA", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" } ] } 2024-07-07 14:02:49,183:DEBUG:acme.client:Storing nonce: EPg6kJgqZDkALFqXbmcf0a87G1nPdr9-qDmItu8qKSrvVpQWb8I 2024-07-07 14:02:49,183:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:02:49,184:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-07 14:02:49,184:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:02:49,185:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:02:49,185:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:02:49,186:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:02:49,186:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:02:49,186:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:02:49,187:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:02:49,233:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:02:49,286:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:02:49,288:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-07 14:02:49,288:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-07 14:02:49,292:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-07 14:02:49,293:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:02:49,293:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:02:49,299:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:02:49,300:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:02:49,300:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:02:49,304:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:02:49,305:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:02:49,307:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:02:49,794:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:02:49,795:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:02:51 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VpRyxfFsAqQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-07 14:02:49,796:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:02:54,212:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8257_key-certbot.pem 2024-07-07 14:02:58,548:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8255_csr-certbot.pem 2024-07-07 14:02:58,548:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:02:58,548:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:02:58,709:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:02:58,710:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:03:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-bcx53RRUVRszmY51QzsRtNWz4o4icYlDCvEKt4ByhDU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:02:58,710:DEBUG:acme.client:Storing nonce: zgT1AlV-bcx53RRUVRszmY51QzsRtNWz4o4icYlDCvEKt4ByhDU 2024-07-07 14:02:58,710:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:02:58,716:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1iY3g1M1JSVVZSc3ptWTUxUXpzUnROV3o0bzRpY1lsREN2RUt0NEJ5aERVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FmzjMZ7PVVUUr40oMnnzKObP1f8BtvAtyIeZmFHLf0mQrGOVQQepWtqZ97kRvYDHBbw2ln7c6U_BSozUk_YK8dHcPBwPWbTQKo35BvEuzRJFI9Xrz3T9D0ITWVZFevmHIEnKMBHwJBNH5YvCvE_gQhcpTRy5osijN3qpADLFjAJRUZDIC4BWSkIDRkvgjypNmKUHSkm3iqZbBWqJgYq260LSt2Yj-nRr_-nfg2CiqM9y0Ei5OMM1CqljdaJaDvqDeKY63otrRHeCNtT337R-ktIDv91UBeRiVlC2mWNi1vCoA7TeMtwXLi_2pbCPVLagGVnRjuAdCWrrz4hJPXTjbQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-07 14:02:58,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-07 14:02:58,978:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:03:00 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963348157 Replay-Nonce: eFSVlf8UkTfzFvD7Br6jiEESd3gfyqmWQeWEZlOdWDoUatX76iI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:40Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963348157" } 2024-07-07 14:02:58,978:DEBUG:acme.client:Storing nonce: eFSVlf8UkTfzFvD7Br6jiEESd3gfyqmWQeWEZlOdWDoUatX76iI 2024-07-07 14:02:58,978:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:02:58,984:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVrVGZ6RnZEN0JyNmppRUVTZDNnZnlxbVdRZVdFWmxPZFdEb1VhdFg3NmlJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0OTU1NzcifQ", "signature": "oZoReN0bOkKAgiNO-njT4f_aPu-2Nv8mu3aR07jfiEiRywvghW7QLWEqzwhDqLM_1MrQsLSCNU8UePvgdT5tXD6JdLp2Es4OWSWyvkBufIaSAhqBIjAXnKXm1THq7HacmPKLouFrQELS9zDIw5pOQ3CwwyQfJQuefOEVMVzgUWnlttE6SBE5R9vp7LJhPRr0_1XnxWphKHUsegIsd0XvWugjpTAFpsdU2zyVhZK-VpT2oWJl_OFlYeXTo1KbD1Ql7lrlFGZnZah7vMrLCYxd0aQaQV5FwXzZecxWGLTaBvIF_qeWEQddWhus8v_tnTTtaLueIqVC7ZIBGPcdMpn8IA", "payload": "" } 2024-07-07 14:02:59,149:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123495577 HTTP/1.1" 200 809 2024-07-07 14:02:59,150:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:03:00 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-GWfXLq5LCyoyio8CdfFgUuqnbpXDEomqlLJHGc5JpF4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:40Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/CYYT4Q", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/HlKjqg", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/iwR44A", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" } ] } 2024-07-07 14:02:59,151:DEBUG:acme.client:Storing nonce: zgT1AlV-GWfXLq5LCyoyio8CdfFgUuqnbpXDEomqlLJHGc5JpF4 2024-07-07 14:02:59,151:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:02:59,152:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-07 14:02:59,152:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:02:59,152:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:02:59,153:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:02:59,153:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:02:59,153:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:02:59,154:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:02:59,155:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:02:59,212:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:02:59,325:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:02:59,328:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-07 14:02:59,329:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-07 14:02:59,334:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-07 14:02:59,334:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:02:59,334:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:02:59,339:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:02:59,339:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:02:59,339:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:02:59,344:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:02:59,345:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:02:59,347:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:02:59,812:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:02:59,814:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:03:01 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "tZRrJ0WtJx0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-07 14:02:59,814:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:03:04,310:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8258_key-certbot.pem 2024-07-07 14:03:08,759:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8256_csr-certbot.pem 2024-07-07 14:03:08,760:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:03:08,760:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:03:08,919:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:03:08,920:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:03:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eFSVlf8UKU3HQ0CFRrmtmFcOpSAortWVDdOFo58ilpQuZihidNw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:03:08,921:DEBUG:acme.client:Storing nonce: eFSVlf8UKU3HQ0CFRrmtmFcOpSAortWVDdOFo58ilpQuZihidNw 2024-07-07 14:03:08,921:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:03:08,932:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUZTVmxmOFVLVTNIUTBDRlJybXRtRmNPcFNBb3J0V1ZEZE9GbzU4aWxwUXVaaWhpZE53IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KuUvdME9yfDZv7dNT7qIIi7RmLTjWg0dzdFVczZakyf_RfzHEAhHuwoUMTkND9U3lEU_KUsNXzPgS9T4lkmi8MAzobszXdyi6BaqtVxwihL_0w-wbWoUcECgCedBm0mtgj-R630AllAgmlJFdmPPaaLWGfjKtL6wkppKPWO7LZhzKMKaZGtoAzjf_l1hyw3jwN4dtJYDMI88oFtWYON1OXMtbtg6ydEiroMpOS1th3QOjrR9bih_DxBRqj3i0YJT5frq9JnrYD4HkhhEksLdRR8kCNRxraT5amw3kok0vPnVRuTzfklpNi5sVVGly6W01TUyFiO3uzcwoItn3aKICg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-07 14:03:09,121:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-07 14:03:09,122:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:03:10 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963374667 Replay-Nonce: zgT1AlV-GEhsbskXb8DyI43_bYGN2WOWJf5xVaJClz4oEwKeLUo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:51Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963374667" } 2024-07-07 14:03:09,122:DEBUG:acme.client:Storing nonce: zgT1AlV-GEhsbskXb8DyI43_bYGN2WOWJf5xVaJClz4oEwKeLUo 2024-07-07 14:03:09,122:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:03:09,128:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiemdUMUFsVi1HRWhzYnNrWGI4RHlJNDNfYllHTjJXT1dKZjV4VmFKQ2x6NG9Fd0tlTFVvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1MzU4NjcifQ", "signature": "dhcJ2f_1ijks8gcYpVIVr5O4qWfeI6ZzA8VY7VcIQocTZkCysku768biHm_x4OStZSJwsDoy_qWjpKAA03k1NjEmjLWTFTUA5j_uxN1B6x2aAQQv6r5S-If_1yHp47aI5BXEXM-gOfPK-jdWtfRzKiAsR6rhOBZ5vuLNLbwMPhCWLbualRj-1SBYvpjwxgTNilMAFgcONG7ifGgqM1zXLyhz9gWTfE372sO9fDzDfejARbsqqk3-oveT_pdiDNIolUsbGM_4QXOPkMawZXdqjouQlqziwOwa3ZUjjD6bG4oIdj6tBhCVNG7jdeRXtv3HXlzTwqOcJtLAGnUOmtbNwg", "payload": "" } 2024-07-07 14:03:09,301:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123535867 HTTP/1.1" 200 805 2024-07-07 14:03:09,302:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:03:11 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zgT1AlV-RQY9LUr1CzecI_V-f5U3g6L4yd6yg5Zya-ScWRN7upU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:51Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/7949-Q", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/1xlmxg", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/Gfn7VQ", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" } ] } 2024-07-07 14:03:09,302:DEBUG:acme.client:Storing nonce: zgT1AlV-RQY9LUr1CzecI_V-f5U3g6L4yd6yg5Zya-ScWRN7upU 2024-07-07 14:03:09,302:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:03:09,303:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-07 14:03:09,304:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:03:09,304:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:03:09,305:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:03:09,306:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:03:09,306:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:03:09,306:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:03:09,307:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:03:09,355:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:03:09,422:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:03:09,424:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-07 14:03:09,425:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-07 14:03:09,429:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-07 14:03:09,429:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:03:09,430:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:03:09,435:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:03:09,435:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:03:09,435:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:03:09,442:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:03:09,443:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:03:09,445:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:03:09,894:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:03:09,894:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:03:11 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "qbhknalbcio": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-07 14:03:09,895:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:03:14,494:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8259_key-certbot.pem 2024-07-07 14:03:18,848:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8257_csr-certbot.pem 2024-07-07 14:03:18,848:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:03:18,849:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:03:18,998:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:03:18,999:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:03:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6TAoPPosxhPWPPfY0qZ1Y2FOC8ZAciq3e4IZnbvII0WQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:03:18,999:DEBUG:acme.client:Storing nonce: oPjXeLW6TAoPPosxhPWPPfY0qZ1Y2FOC8ZAciq3e4IZnbvII0WQ 2024-07-07 14:03:19,000:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:03:19,009:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZUQW9QUG9zeGhQV1BQZlkwcVoxWTJGT0M4WkFjaXEzZTRJWm5idklJMFdRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XLeHbETZ3oL7k4YDTEW36Zp8tkx7y9EoadakPclR3GEJPrIWXhSUPVooPjztDPCMYqSHz3663UzDoPmbgEVRe24b6u69HBEuhm4mLH7nohAo--NJgeBvcPmHc1PwHACTIM2Fh2egnHo95fRcSAG7sSGucFFELOR-5G2IHeWQMo5sz2ZWCduScfCfEnd2hdwUEqOobJWJi0IRd4nU_xOX_GDqsqxbJ4duMN0vkjf6rZ9mHvjQOtnyMTnG1sEkOH-CgKcggluKXo2-KIGRZRy8J1zZlxnbZeZnUSjkIzSjmXixweglzxywOc2ieZGytjLOmaTJzSlFHG6L023z_XCLBA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-07 14:03:19,206:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-07 14:03:19,207:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:03:21 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963400877 Replay-Nonce: oPjXeLW6R00BPz3e2AD7NO8_4c_1bOCDl9fIYUA2gdzH1lDqp2Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:19:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963400877" } 2024-07-07 14:03:19,207:DEBUG:acme.client:Storing nonce: oPjXeLW6R00BPz3e2AD7NO8_4c_1bOCDl9fIYUA2gdzH1lDqp2Q 2024-07-07 14:03:19,208:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:03:19,220:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZSMDBCUHozZTJBRDdOTzhfNGNfMWJPQ0RsOWZJWVVBMmdkekgxbERxcDJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1NzQzNDcifQ", "signature": "NMid2PdcQWEiTuqIWKClB3OIDx87jOZ2fn5UBF7ZBVs1DPGSUnMd32a974x-bDskt4e77X8fEck59gynNFUTJwYI82nHxVeGkKQYxYEU5IkDz981I-sOkoW3U7Htzo-KzZnS1jp0tmgA9YN-ESZD02QAM17N_-up_KylzMbr7Kb7hmMgLCDDy51WqaWBYOmr1Aimr8DRTcxop7bxszuLYg_Tus_RWCOEyoVHgRYysXg5uPywp5wAraMWUxkgEcoLG078ReYUzKWHgM2ak7dz5xI9am_67B3hbaz_WS-eIUbbPCCKYLdKCUUF1YiziTE56At7bv-GBpd9QkRCngcmQA", "payload": "" } 2024-07-07 14:03:19,374:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123574347 HTTP/1.1" 200 805 2024-07-07 14:03:19,375:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:03:21 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: EPg6kJgqK1ersUIRLtKdn5cyrlkQV_cPIgtHsCx_udNvuY9bSu8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:19:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/NeAJIw", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/4slvLA", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/_5WNoA", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" } ] } 2024-07-07 14:03:19,375:DEBUG:acme.client:Storing nonce: EPg6kJgqK1ersUIRLtKdn5cyrlkQV_cPIgtHsCx_udNvuY9bSu8 2024-07-07 14:03:19,375:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:03:19,376:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-07 14:03:19,376:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:03:19,377:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:03:19,377:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:03:19,378:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:03:19,378:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:03:19,378:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:03:19,379:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:03:19,425:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-07 14:03:19,484:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-07 14:03:19,486:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-07 14:03:19,487:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-07 14:03:19,491:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-07 14:03:19,492:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-07 14:03:19,492:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-07 14:03:19,497:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-07 14:03:19,497:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-07 14:03:19,497:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-07 14:03:19,502:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-07 14:03:19,502:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-07 14:03:19,505:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-07 14:03:19,953:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-07 14:03:19,955:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:03:21 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "bLn1eBegkAw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-07 14:03:19,955:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-07 14:03:24,435:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8260_key-certbot.pem 2024-07-07 14:03:28,797:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8258_csr-certbot.pem 2024-07-07 14:03:28,798:DEBUG:acme.client:Requesting fresh nonce 2024-07-07 14:03:28,798:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-07 14:03:28,947:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-07 14:03:28,948:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:03:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW6Pi6blmDBf_rNdtjJgTe2w3beJjEZ1vfGzgn-xHpubv4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-07 14:03:28,948:DEBUG:acme.client:Storing nonce: oPjXeLW6Pi6blmDBf_rNdtjJgTe2w3beJjEZ1vfGzgn-xHpubv4 2024-07-07 14:03:28,948:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-07 14:03:28,954:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAib1BqWGVMVzZQaTZibG1EQmZfck5kdGpKZ1RlMnczYmVKakVaMXZmR3pnbi14SHB1YnY0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "eaU5w5shuwtUh0fHK8F2C8tktTEMcpnLtf0hO36RgJtlw0Tvb5bIrQER8w5mQY9fy5aV9THBi_x6RV9nzV3sT5JWuETE-AM1C1o7U_edj38G7PzpY8O3R4xKEpb0clypZovOHKG_J0MN_QIdghSpys-CopGWIdjP3cRcDrEujKsjoJO8_7DaH46qzJ5vXCBSlMYDyKVbioP-tgq8oGBNMEIjz3eN-pQHI0s3u6CH_TXqCj4m-r5ciP6I9XA8SMqi7L8b9NwrMe7vIxDH7Lr_X-40nAinWdbecWv1r8So5flO6UOWUrTejuZCGc2N1BtyqQ3_KTgtr83qXPN_zcYAiA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-07 14:03:29,112:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-07 14:03:29,113:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 07 Jul 2024 12:03:30 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963440917 Replay-Nonce: EPg6kJgqMu4X8DVzf0zCI8-y2jFFj1U7wOWXltm1OweJaKKvZwM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:19:11Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963440917" } 2024-07-07 14:03:29,113:DEBUG:acme.client:Storing nonce: EPg6kJgqMu4X8DVzf0zCI8-y2jFFj1U7wOWXltm1OweJaKKvZwM 2024-07-07 14:03:29,113:DEBUG:acme.client:JWS payload: b'' 2024-07-07 14:03:29,121:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRVBnNmtKZ3FNdTRYOERWemYwekNJOC15MmpGRmoxVTd3T1dYbHRtMU93ZUphS0t2WndNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM2MzMxMzcifQ", "signature": "K126sSf2-Uw0JkxoUr_meE1t8vkwbOwuS57J0FWWxIoJx2dUGKZ7n_WZ9Y2DJDZeX1jUn9zc2c9XdasP7BgezKq9eVwSL35b3uABiThlFGe11uIWfwhK61eCagdsVjucoIO9deP5fyqbeG6skqd2rE-c3kWOrol9rGe3uFTLXPdtxJClGjUtlPwej_vi-u-2M3WeBRSpP7jixhs0uOAcXRfEHyvlWsSM_lBRnxO8i_jxCeqfC18NwHwFKSBvV3PLfkhtF0lU0C7B7RIHsln-q78Gu4iFtgPqT1KcFSXarwrNPCnKI3_RBff5pG-eKiXPisLwCt3wMspjbKc3r4nL2Q", "payload": "" } 2024-07-07 14:03:29,273:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123633137 HTTP/1.1" 200 805 2024-07-07 14:03:29,274:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 07 Jul 2024 12:03:31 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: oPjXeLW64Ku_O0d8cXUKZzZgyjI8IXKaZ2V-uUgr4DuqrCT3VOA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:19:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/cKgBUw", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/fI1u_A", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/N6igCw", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" } ] } 2024-07-07 14:03:29,275:DEBUG:acme.client:Storing nonce: oPjXeLW64Ku_O0d8cXUKZzZgyjI8IXKaZ2V-uUgr4DuqrCT3VOA 2024-07-07 14:03:29,276:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-07 14:03:29,277:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-07 14:03:29,278:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-07 14:03:29,278:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-07 14:03:29,280:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:03:29,280:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-07 14:03:29,281:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-07 14:03:29,281:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-07 14:03:29,284:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-07 14:03:29,284:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-07 14:03:29,285:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-07 14:03:29,287:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-07-07 14:03:29,288:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)