2024-07-05 16:51:43,623:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-05 16:51:43,623:DEBUG:certbot._internal.main:Arguments: [] 2024-07-05 16:51:43,623:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-05 16:51:44,787:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-05 16:51:44,787:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-05 16:51:44,838:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-07-05 16:51:44,895:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:51:45,112:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:51:45,113:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-05 16:51:45,119:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-05 16:51:45,129:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-05 16:51:45,129:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:51:45,130:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:51:45,137:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:51:45,138:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:51:45,138:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:51:45,146:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:51:45,147:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:51:45,151:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:51:45,624:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:51:45,625:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:51:45 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "RQ5b6QFx6UM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 16:51:45,626:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:51:53,086:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8196_key-certbot.pem 2024-07-05 16:51:59,865:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8194_csr-certbot.pem 2024-07-05 16:51:59,866:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:51:59,866:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:52:00,016:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:52:00,017:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:51:59 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCEE3ClyvkX9a_q0p3_56vrVHG9SBwGhNWUSMO-PMUunk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:52:00,017:DEBUG:acme.client:Storing nonce: B-hK_YLCEE3ClyvkX9a_q0p3_56vrVHG9SBwGhNWUSMO-PMUunk 2024-07-05 16:52:00,018:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:52:00,026:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENFRTNDbHl2a1g5YV9xMHAzXzU2dnJWSEc5U0J3R2hOV1VTTU8tUE1VdW5rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "i5i6r-lxqb9huOOvhIVzUACNZacoPQNdA6JJMQjtWQFkyGsQfNtDwGcqpM2TyjCBb1ytQ5RAQ0h3vnaeJdRUsQhRFNvEJHen9cY5bRD7StFv_j79Zev5-_PNYJfweO-627bR8qDb0cWJF-K_9XIQOUwdd84ZwwHUunRSJlocBNyfQE8C13dKzVLT8kUDdO7N7bgJwoK_N8JO9b2SrWnBmM100vCJGrM95jQ2VI_Tq1ZYSMu2Ozra9rNASW7g9jK12svVplgELFxm51RSPRoLmGB1-ifCnquDCU6UXQJNpvc33g22NqU81kNGxW1HVZNAKe0vCSxrBK0CG7cU_Ifk0A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-05 16:52:00,261:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-05 16:52:00,262:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:52:00 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963066047 Replay-Nonce: eF-2qMJ9vQtGmxieT0A5H3A9JbBqmrx2kReybKrEQSmzqVDXgvc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:05Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963066047" } 2024-07-05 16:52:00,262:DEBUG:acme.client:Storing nonce: eF-2qMJ9vQtGmxieT0A5H3A9JbBqmrx2kReybKrEQSmzqVDXgvc 2024-07-05 16:52:00,263:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:52:00,270:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjl2UXRHbXhpZVQwQTVIM0E5SmJCcW1yeDJrUmV5YktyRVFTbXpxVkRYZ3ZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMwNjU5MTcifQ", "signature": "HiC5O-QZDMFTnmVF_NZDG8H3rvI_T-g2CCYgJ2USXoduCKLVz6R_OlFnZmIoCIaQmExHEYiLCL8UtZWnHS6Ihj39ABPQbJ5sct_lyraZliWnaFYS0QLZkBoQqiSZa6RmHm2RAZsIJisF1JKlqEPYNVyHzj2-YSaqfp6A12KBcAoFl6mNydaU5Yui03BTE3MsoPqlNFEvgCMu6dTr_n6H9x00pPckbEHigOQ3LvqYaMQcuaQ6M9PyqqxQOxABpZ0M67mFJQkXA3VZAv-TC96NmPOpBGeD_VHZ0ZMwo45sMEp59dY-CdShSjPmkepU9yxG87wX2XRodB24AL3iHt8hJg", "payload": "" } 2024-07-05 16:52:00,424:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123065917 HTTP/1.1" 200 810 2024-07-05 16:52:00,424:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:00 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCsK7kpfYybweIBDeAxh9CgKaEnYUtirpclvu7VXNcWz0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:05Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/AopFCQ", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/xbrZjg", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/2pJhlw", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" } ] } 2024-07-05 16:52:00,425:DEBUG:acme.client:Storing nonce: B-hK_YLCsK7kpfYybweIBDeAxh9CgKaEnYUtirpclvu7VXNcWz0 2024-07-05 16:52:00,425:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:52:00,426:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-05 16:52:00,426:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:52:00,427:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:52:00,431:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:52:00,431:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:52:00,431:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:52:00,432:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:52:00,439:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:52:00,492:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:52:00,685:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:52:00,687:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 16:52:00,688:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 16:52:00,695:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-05 16:52:00,695:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:52:00,696:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:52:00,702:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:52:00,702:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:52:00,702:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:52:00,709:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:52:00,711:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:52:00,713:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:52:01,158:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:52:01,159:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:00 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_v161734lok": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 16:52:01,160:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:52:08,323:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8197_key-certbot.pem 2024-07-05 16:52:14,518:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8195_csr-certbot.pem 2024-07-05 16:52:14,519:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:52:14,519:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:52:14,671:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:52:14,672:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9ItTKV5y_ltmgAWzF5CxxxZ-_dPNNHMyA-pIb6m3Mgdk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:52:14,673:DEBUG:acme.client:Storing nonce: eF-2qMJ9ItTKV5y_ltmgAWzF5CxxxZ-_dPNNHMyA-pIb6m3Mgdk 2024-07-05 16:52:14,673:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:52:14,680:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlJdFRLVjV5X2x0bWdBV3pGNUN4eHhaLV9kUE5OSE15QS1wSWI2bTNNZ2RrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ln1qbIGcbeKkHS0nTkbVXIkfRgAV4D9He3lgSLVqiV0zEaUzcCirD2e3BcUSqqL4SwC2GyVd6Hhvk7PVarFfDPLhQV0BKPai3NS1fS43laGrGJ5STrh-ObbSUnu4Abt1lRQUp8RYj5FbhYjCbMbwyVKDNyekfJ94pztPm2hJciyCgfjqaIMfvnp-L4WCkwGQ_nSc0W8O-fAR3dBIKgXUfPKR6NDg2QJqVerCuJExr0DP-hDOHNsVRo-YtZbcbE8YOzwYbQTSRP1uvZWIFF3byaWn8oeRt4gxTHkJh0xrrJocpyhlp_bcqlSS_42yLbYclvcrxx2BHUsFThK5utS9xg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-05 16:52:14,844:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-05 16:52:14,845:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:52:14 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963103477 Replay-Nonce: B-hK_YLCOh8Bz0X0zcYnJ4JT7WJTSxpiSxbjGxjRlBEL_cLqPXI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:16Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963103477" } 2024-07-05 16:52:14,845:DEBUG:acme.client:Storing nonce: B-hK_YLCOh8Bz0X0zcYnJ4JT7WJTSxpiSxbjGxjRlBEL_cLqPXI 2024-07-05 16:52:14,846:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:52:14,853:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENPaDhCejBYMHpjWW5KNEpUN1dKVFN4cGlTeGJqR3hqUmxCRUxfY0xxUFhJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxMjE5NjcifQ", "signature": "txbpUdLpUUe3yqzQfmPV1ZEeq_j6sH1FCPlSgJQYqivQ6ZWTjb4h2dCDQKqLj1uhrA5dqNFt__67KFmmh5ooM9Gedst3fGZXsh-JGRrm3vJ5Kw8s3_oscyGUwZeOb5b3bbifWNbvxWqSbH_QQI72Yi7Lws-G1ypK6d_7wczMAeEJnmmvmwfensJguSNLrr3Sw9CUiGWyYlIaK4RV4_R0CHQPqevEHIvBfsixMf3lW4Ri1puLHW-k5S5XUeH3Aij1R3pca2rEXpYI6Bkz493A8L6uaZaaB61e6oV9SfYEFgQ_SOnfNQ6YPJRq6uyZp5jDnzxxJcwZ0-rzHc7olvZ0Hg", "payload": "" } 2024-07-05 16:52:15,006:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123121967 HTTP/1.1" 200 804 2024-07-05 16:52:15,007:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:14 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCFgjv17tm7B9asr25q26f5OUCRLWPrLeMoKrcpmUM8eo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/Ag883A", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/g4f58w", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/s77iUg", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" } ] } 2024-07-05 16:52:15,008:DEBUG:acme.client:Storing nonce: B-hK_YLCFgjv17tm7B9asr25q26f5OUCRLWPrLeMoKrcpmUM8eo 2024-07-05 16:52:15,009:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:52:15,009:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-05 16:52:15,010:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:52:15,010:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:52:15,013:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:52:15,013:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:52:15,013:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:52:15,014:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:52:15,016:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:52:15,080:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:52:15,319:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:52:15,320:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-05 16:52:15,321:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-05 16:52:15,328:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-05 16:52:15,328:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:52:15,328:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:52:15,334:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:52:15,334:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:52:15,335:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:52:15,350:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:52:15,352:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:52:15,355:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:52:15,803:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:52:15,804:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:15 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "fwDCaGnUs6w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 16:52:15,805:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:52:21,566:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8198_key-certbot.pem 2024-07-05 16:52:27,242:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8196_csr-certbot.pem 2024-07-05 16:52:27,243:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:52:27,243:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:52:27,394:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:52:27,394:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9QBzAUKW8MweE0aNESkfieCJ7JOHcNFP4Pmn2QHVojXk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:52:27,395:DEBUG:acme.client:Storing nonce: eF-2qMJ9QBzAUKW8MweE0aNESkfieCJ7JOHcNFP4Pmn2QHVojXk 2024-07-05 16:52:27,395:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:52:27,402:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlRQnpBVUtXOE13ZUUwYU5FU2tmaWVDSjdKT0hjTkZQNFBtbjJRSFZvalhrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vWTWI8VjUwcjo7yvFdM-24yvXOBUhvdFOEroChnB9LhHBrYudIwpUNTHmHjycLmtTUKlMauOfUq8CeULRUz8OVDozMu0e55b7wAW9GdN117aIIOe7yTURebgEmJVgwcjnMU0fQHpOfDinw4E43HJavZzJT4kC4D_6qDUJWKOXEsH_Cf25RDsLKCKrW6IPrFnPvyGkk9qrgAsiFVoXskjpVtbSip4dU17b31HxBKVi2Xu_ifYCO5jwpzgt1YNo-xuPy1XFOpkIdhSvbGK-Ur7p14RnAmaNz2xSpqd3dAd-RS3Bn9LKtTp3rwD1Dmap-xc57OZ_MwgcVJWLzOuwwqa6w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-05 16:52:27,650:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-05 16:52:27,651:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:52:27 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963135847 Replay-Nonce: B-hK_YLCrRQj1keqYAXfcAkvYTsbGY9-MKesi2s11TMbQEKvpUI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:27Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963135847" } 2024-07-05 16:52:27,651:DEBUG:acme.client:Storing nonce: B-hK_YLCrRQj1keqYAXfcAkvYTsbGY9-MKesi2s11TMbQEKvpUI 2024-07-05 16:52:27,651:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:52:27,659:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENyUlFqMWtlcVlBWGZjQWt2WVRzYkdZOS1NS2VzaTJzMTFUTWJRRUt2cFVJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxNzEwOTcifQ", "signature": "b5mTZG-Y1kQt2lLePcTA-lmctnofxJEVPxCRu8RWrZZq-eBmh_MWX-9pPJlRNL4vRaFagk_zMwyulx1HeU-uH2WLzvVYL7zcxol9_Fosq6NuuHdN6PFYS3Atfdch81hQVvv8uLRxFPn4m_PAwq4Qe6j9ry0jRq5wOa6qrvh7Gd8rIml3poQ7as86yVVsx6NeGzmrcpghuEanen3ftj9vQTaE6eMp5iJKCbxjNOoSb5sAzKHaDh7VwJDRVdvtZO_EG1NbpZtzSnzlErbVFDMBhuLgOr0J3-Ls2vVx8V5ULRjjblwEuB16_8S4fLTbfjleiLzNegXXyOiMdfFyMYXqDg", "payload": "" } 2024-07-05 16:52:27,814:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123171097 HTTP/1.1" 200 807 2024-07-05 16:52:27,814:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:27 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9fQx5RH3w2HfdSU3kDNBCo6GGkeo93HAR1-SkgbvpmmM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:27Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/vQZynA", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/XD91Zg", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/qlRt6w", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" } ] } 2024-07-05 16:52:27,815:DEBUG:acme.client:Storing nonce: eF-2qMJ9fQx5RH3w2HfdSU3kDNBCo6GGkeo93HAR1-SkgbvpmmM 2024-07-05 16:52:27,816:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:52:27,816:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-05 16:52:27,817:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:52:27,817:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:52:27,818:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:52:27,818:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:52:27,819:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:52:27,819:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:52:27,820:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:52:27,883:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:52:28,113:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:52:28,115:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 16:52:28,117:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 16:52:28,123:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-05 16:52:28,123:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:52:28,124:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:52:28,130:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:52:28,130:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:52:28,130:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:52:28,135:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:52:28,137:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:52:28,140:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:52:28,615:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:52:28,615:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:28 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4Dnr2aqjppc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 16:52:28,615:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:52:34,672:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8199_key-certbot.pem 2024-07-05 16:52:40,423:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8197_csr-certbot.pem 2024-07-05 16:52:40,424:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:52:40,424:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:52:40,584:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:52:40,585:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0ZgsK3HWrqzoE7pq5gHiSSbKg3I9H8k2rqa9xFTC3KbE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:52:40,586:DEBUG:acme.client:Storing nonce: jqVAJFJ0ZgsK3HWrqzoE7pq5gHiSSbKg3I9H8k2rqa9xFTC3KbE 2024-07-05 16:52:40,586:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:52:40,593:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBaZ3NLM0hXcnF6b0U3cHE1Z0hpU1NiS2czSTlIOGsycnFhOXhGVEMzS2JFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fE3e6NAv5nOsushnHFcZwLc20k570uz8p-asFEZ8O-M3-ldP9Mex1diqm0MrEoTK3O4cF5VUSo_SVjjjWZ9q4suxLZZEp-z9E6ncvQqBkTnx0cdE2AC-Cm-kMn7T0XiIVj_InICHaw6oRwucwv5qz_BSWWfpqyJrgD1giYLttxUuxkx7cM_was9H6obqRIaobMRwx-6gD0TgqgqBl1jOUNaioHG6-iaM7mpdSKMww_vcod956AG1XaT_ArkAFG1niBr5HpzEifdUhVM-sCaDr-qXO2bpvoGQ_hWClw6d5gN1syVG1uCR3pT_5Y0UcIKZmhEblfwt-lRyQ7Uy_nDILg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-05 16:52:40,765:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-05 16:52:40,765:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:52:40 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963164787 Replay-Nonce: qqMiT6Ck2GZJb0Wtx7-qP00CWK2VIrVOvazZ7Bse0x2yEEFPmNM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:38Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963164787" } 2024-07-05 16:52:40,766:DEBUG:acme.client:Storing nonce: qqMiT6Ck2GZJb0Wtx7-qP00CWK2VIrVOvazZ7Bse0x2yEEFPmNM 2024-07-05 16:52:40,766:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:52:40,773:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2syR1pKYjBXdHg3LXFQMDBDV0syVklyVk92YXpaN0JzZTB4MnlFRUZQbU5NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyMTQ1MzcifQ", "signature": "sYAkqTEaaxcqzfjDts0zmgfjHIBGaYgV22Hu2-dMzb6cM-2wy-CT9YrcvNfetXs_ixGlArfL_XbNQWmgMZiS1T5Ne_KsfBb2OA2FgIOkeFu0N7V3NnZ-6T3cagnFMG4DugXKJtMCd0PWpfoiH2viEosZRKn_GVlR77O8FuTAChqsmOo5CtxlEmpLKHro-5fKdPnV7RGLLGn5dKHWKrSWA-oK9KAxp5tdkDWey6a_S1Rnf1RHBKVtDQiqwS9iMQrYaFTuDh1URfuD7XAsDWbvBLXm4U6_h48S-mVfE7w2GhAodM8IOp1rleZ_-FT11CX65oD-aDSWsWXVeVWQH_lbjg", "payload": "" } 2024-07-05 16:52:40,938:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123214537 HTTP/1.1" 200 801 2024-07-05 16:52:40,939:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:40 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0bPzigQdFERss7ITnwBawEFLO6ah49wAZg61Te7TsX7I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:38Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/FMZRsw", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/6lpfOw", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/gp7pwg", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" } ] } 2024-07-05 16:52:40,939:DEBUG:acme.client:Storing nonce: jqVAJFJ0bPzigQdFERss7ITnwBawEFLO6ah49wAZg61Te7TsX7I 2024-07-05 16:52:40,940:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:52:40,941:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-05 16:52:40,941:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:52:40,942:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:52:40,942:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:52:40,943:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:52:40,943:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:52:40,943:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:52:40,945:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:52:41,008:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:52:41,236:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:52:41,237:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 16:52:41,239:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 16:52:41,245:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-05 16:52:41,246:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:52:41,246:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:52:41,253:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:52:41,254:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:52:41,254:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:52:41,261:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:52:41,262:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:52:41,265:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:52:41,715:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:52:41,716:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "eoewhsdxN1w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 16:52:41,717:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:52:47,879:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8200_key-certbot.pem 2024-07-05 16:52:53,652:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8198_csr-certbot.pem 2024-07-05 16:52:53,653:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:52:53,653:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:52:53,803:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:52:53,804:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLC9AvrDRRjYSJIQW53Ye7ttzA42srPK4miNk2siyCgVaA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:52:53,805:DEBUG:acme.client:Storing nonce: B-hK_YLC9AvrDRRjYSJIQW53Ye7ttzA42srPK4miNk2siyCgVaA 2024-07-05 16:52:53,805:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:52:53,812:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEM5QXZyRFJSallTSklRVzUzWWU3dHR6QTQyc3JQSzRtaU5rMnNpeUNnVmFBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "a0oLNic1LPtRMZqGn7cazDAQoGDEVeUKEAV6yOe_43ZEIiVuw7cT6soFXpEhLH7oxG4Dp44lEu1yY64P5Diw5a2--jW_IhU6FxmRUgf7BISfyqDtr49Fmn9Xl7v3vMqqSuzhzptY9PyW9S71eeTlrLOi8zxKLvVsuQkG85VHdrlGD8r6VVYucxpD5EfvPxE07d_tr8zQZMOHFsmij-H_9MHWmujakiepTd2E7l_onKO_fe4tvO7EfBpSlwMpRfYbqRk3O7aFFlfc3lsq-lRDTe2Ukr797zZNaBnD0AOKwoiqyf0ZfZmB5s7x16lH1epP_mnVBrglIpkPxuKOq4-1Og", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-05 16:52:53,985:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-05 16:52:53,986:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:52:53 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963193117 Replay-Nonce: eF-2qMJ9QcyShacnXYjzYeTc6qIHT9Tb2tPLzGLLi8UlzYbNNKM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:49Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963193117" } 2024-07-05 16:52:53,986:DEBUG:acme.client:Storing nonce: eF-2qMJ9QcyShacnXYjzYeTc6qIHT9Tb2tPLzGLLi8UlzYbNNKM 2024-07-05 16:52:53,987:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:52:53,994:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlRY3lTaGFjblhZanpZZVRjNnFJSFQ5VGIydFBMekdMTGk4VWx6WWJOTktNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyNTgyNzcifQ", "signature": "bnIJ1ZU0BR_VzGPpYYhmLPkQns0d6iMMzJ9mzXpCLoShbRTsoqz3sx6e2vrBcU5bIQgqg7eFvezCi02svo5-TzgqzEwWh0jh3gskVEiyq1K4SRDzlwFQcPqLup6oS4p4ntWSwhv7u40t2oldx5y6if_07rJGfwBcLH-WoS__qfF8RZ13fxUkkrahYJoT9ePsN5C1ezkEol68YcrXdotsIHRgh9Nea4L3xR7CJnapJvy0PRi5SPsRF7JdJypwQsm7V4yQ-dMXC1PGAzeSS5c6hNJqvA0EDgeoLu43d5Z_xqjkCHNF57OYhsVgGDYctCVwU151Wdxd79d3WIesY-eZfQ", "payload": "" } 2024-07-05 16:52:54,148:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123258277 HTTP/1.1" 200 805 2024-07-05 16:52:54,149:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:53 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCxv8fZySuGqIcIvROak_2LMUY-0rwVW6VjiDzUnpHVig X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:49Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/7Y8QQA", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/6IRQnQ", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/ZS_Kuw", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" } ] } 2024-07-05 16:52:54,150:DEBUG:acme.client:Storing nonce: B-hK_YLCxv8fZySuGqIcIvROak_2LMUY-0rwVW6VjiDzUnpHVig 2024-07-05 16:52:54,150:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:52:54,151:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-05 16:52:54,152:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:52:54,152:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:52:54,153:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:52:54,153:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:52:54,153:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:52:54,154:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:52:54,155:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:52:54,230:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:52:54,453:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:52:54,454:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-05 16:52:54,455:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-05 16:52:54,462:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-05 16:52:54,462:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:52:54,463:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:52:54,469:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:52:54,470:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:52:54,470:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:52:54,476:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:52:54,477:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:52:54,479:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:52:54,949:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:52:54,950:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:52:54 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FHOlV8scjS8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 16:52:54,951:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:53:00,901:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8201_key-certbot.pem 2024-07-05 16:53:06,583:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8199_csr-certbot.pem 2024-07-05 16:53:06,584:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:53:06,584:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:53:06,743:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:53:06,743:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:53:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0iJBwXC_tIdZunFNANoXrfr1Z_Xb0NcMtai8Tzz2gVLs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:53:06,744:DEBUG:acme.client:Storing nonce: jqVAJFJ0iJBwXC_tIdZunFNANoXrfr1Z_Xb0NcMtai8Tzz2gVLs 2024-07-05 16:53:06,744:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:53:06,751:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBpSkJ3WENfdElkWnVuRk5BTm9YcmZyMVpfWGIwTmNNdGFpOFR6ejJnVkxzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iqGV9n_BohLG7FIllgQXcUw2JlvEKGs61FAbgw4INrar-NX8BD0SEYNel_ilV5SqveQzxAB_YDDanJHFxV9msU4-zL6FbNt-3lqyQXxzHRYqQQhvyPu2EvfZoJxYdVjsFMHgzy33Ybqh2oTEO-0oy-tffM74iddJoqpxM2Ji4pRs4O-vrVNaV0h-RpIYYOXixyIXGutq1IHxKrV_JEW7rCTezFFEglLUVbgkosoKtSbqT51-zTIJ3QgZs8tcZa5eDlfvj7-nYu2VWQCq33AWr9P8QMSLFaUoZpfcsBtmXM_GbyTTnMn3KQB5Ue1_rbe5VHkC4D0a6E9dwvHQpz6iNA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-05 16:53:06,925:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-05 16:53:06,926:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:53:06 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963222697 Replay-Nonce: qqMiT6CkwBbyqj9NBWwGeX4XOBehAjECpB1LAwa3IYWnDZ2iQCI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:59Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963222697" } 2024-07-05 16:53:06,926:DEBUG:acme.client:Storing nonce: qqMiT6CkwBbyqj9NBWwGeX4XOBehAjECpB1LAwa3IYWnDZ2iQCI 2024-07-05 16:53:06,926:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:53:06,933:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2t3QmJ5cWo5TkJXd0dlWDRYT0JlaEFqRUNwQjFMQXdhM0lZV25EWjJpUUNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzMDE4NjcifQ", "signature": "GavDmCKPm-wRqpEgre8i_cPU92ob6pchI_-nRq4dFKvWpRnmby0NHO4uB-nl4sZKaK71HpU94J_gSFfi1xNMJrWZw5Kdfi5063I_cmyjzvO4DBHyhwChIcypY56z0FiZFPi10tq-wcn2dJAz7YZgYhG9Nkg9zZwbHqjYAj3zB_qGrbqt4b4Zqd5vUfYHdbxJ4cGwxDmJebqXqcPDgkqlmP9N-Sktl7-b9zfvSGEvCRySRw9dY5I2812kzF50uVaqp4eLa2CeURYOZketrCAzwUZnyFm_DlUyza-EHtSM29ggxRgFawahJzj6XuFIi-_DJ6wLTNkYAGq99W5PykPxnw", "payload": "" } 2024-07-05 16:53:07,096:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123301867 HTTP/1.1" 200 809 2024-07-05 16:53:07,097:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:53:06 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkRAaXgMLTbzCrxPKLVvI8DF8TzX_P-c7ZW7gcsp5XXOc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/VjMp2w", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GGZVqQ", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GI9X-A", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" } ] } 2024-07-05 16:53:07,097:DEBUG:acme.client:Storing nonce: qqMiT6CkRAaXgMLTbzCrxPKLVvI8DF8TzX_P-c7ZW7gcsp5XXOc 2024-07-05 16:53:07,098:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:53:07,098:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-05 16:53:07,099:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:53:07,099:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:53:07,100:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:53:07,100:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:53:07,100:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:53:07,101:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:53:07,103:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:53:07,161:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:53:07,355:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:53:07,356:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-05 16:53:07,358:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-05 16:53:07,364:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-07-05 16:53:07,369:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:53:07,428:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:53:07,706:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:53:07,707:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 16:53:07,708:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 16:53:07,715:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-05 16:53:07,715:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:53:07,715:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:53:07,721:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:53:07,721:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:53:07,721:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:53:07,729:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:53:07,730:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:53:07,733:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:53:08,213:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:53:08,214:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:53:08 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "zxikaThDJ78": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-05 16:53:08,214:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:53:14,001:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8202_key-certbot.pem 2024-07-05 16:53:19,745:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8200_csr-certbot.pem 2024-07-05 16:53:19,746:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:53:19,746:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:53:19,906:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:53:19,907:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:53:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0eaHJHauBaO_ahavwlB2V1uzWvDbyl808457R68Ye9N4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:53:19,907:DEBUG:acme.client:Storing nonce: jqVAJFJ0eaHJHauBaO_ahavwlB2V1uzWvDbyl808457R68Ye9N4 2024-07-05 16:53:19,907:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:53:19,914:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBlYUhKSGF1QmFPX2FoYXZ3bEIyVjF1eld2RGJ5bDgwODQ1N1I2OFllOU40IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vsb6mrpVM6SwTqINeTwnCQks6r50l2jdMs8e5KZnzjKTd4CwX-ZW0t0ymDYLYqozy37ZjQNoXqZytEZ0TkIzyjE6B1SSxKpBQYiWnvRQt_aTeRQJ_MzV5TQc-gM3YLCDocRoArk24vRc4PlD3i9ea0IocEf4eOVEs42GxSRi_MqEJ4qC1bxvVDoaa6dpJTL3tnFugwu5-orcRuo8zLjhCDG0H7f6qwb3WYWWtkKWGjy0U4ddv7Cljab9nZxTo2WR5Jeyar1GbR3xdckkJHtnlRj451Hmudx38IFOrY1INQTZS0hAe0bmof7cRALNgScHiXlJEyMbm7sfQnfh7dg_rg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-05 16:53:20,110:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-05 16:53:20,111:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:53:19 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963261767 Replay-Nonce: jqVAJFJ0-h1YWcGkZUAiuDwNg-AojTXFmNijKqTiwruo0OF9eDQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:10Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963261767" } 2024-07-05 16:53:20,111:DEBUG:acme.client:Storing nonce: jqVAJFJ0-h1YWcGkZUAiuDwNg-AojTXFmNijKqTiwruo0OF9eDQ 2024-07-05 16:53:20,111:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:53:20,118:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjAtaDFZV2NHa1pVQWl1RHdOZy1Bb2pUWEZtTmlqS3FUaXdydW8wT0Y5ZURRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzNTc4NjcifQ", "signature": "abAnG1DKZrz66KZCv15Nww3vUk8phwC3fd-YIyPX7FEj_RuXoZuOF5kmqiAxboLPR4DEpi03vLoE6V9jTjFP6YUlyFXmh7g7aPoXI_4x36HKU3oXhgM0o-Q6XEVNwGgs4T12WuF_t13cJlHDMd12HSAA59V9VyfLRKQls3ouys0Je9pVUz5DaF3n359VCC5tYnbztkZOpdoBxkpaw9VWObP16v1YB7ftU2KCKhOHzo1OUpiPFyC8yPOE21nhKaqgOGpOOeSAtGC9B9_YjwxaItzRHcvWNEn-WcbD3kTnoNBp4a1LDsnINvmw06pSucSTgwgH0-qAOCA1r44pRqSeug", "payload": "" } 2024-07-05 16:53:20,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123357867 HTTP/1.1" 200 806 2024-07-05 16:53:20,288:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:53:20 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0dwpyG5ea_JnYDoY8KvhMAi3Dj3Qrx1xd3e5_dqV1pAI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:10Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/mRUn6w", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/Flovww", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/ejtuAg", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" } ] } 2024-07-05 16:53:20,288:DEBUG:acme.client:Storing nonce: jqVAJFJ0dwpyG5ea_JnYDoY8KvhMAi3Dj3Qrx1xd3e5_dqV1pAI 2024-07-05 16:53:20,289:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:53:20,289:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-05 16:53:20,290:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:53:20,290:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:53:20,291:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:53:20,291:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:53:20,292:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:53:20,292:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:53:20,293:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:53:20,344:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-05 16:53:20,345:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:53:20,345:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-05 16:53:20,353:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-05 16:53:20,356:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-05 16:53:20,356:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-05 16:53:20,357:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-05 16:53:20,358:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-05 16:53:20,360:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-05 16:53:20,420:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:53:20,651:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:53:20,653:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 16:53:20,654:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 16:53:20,661:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-05 16:53:20,661:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:53:20,662:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:53:20,668:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:53:20,669:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:53:20,669:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:53:20,675:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:53:20,677:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:53:20,679:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:53:21,155:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:53:21,156:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:53:20 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "69CjwnwbmDs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 16:53:21,157:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:53:27,596:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8203_key-certbot.pem 2024-07-05 16:53:33,271:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8201_csr-certbot.pem 2024-07-05 16:53:33,272:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:53:33,272:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:53:33,432:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:53:33,432:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:53:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0wYY8SudDTb2P_m7D82yenHxs02XwNr32BPlRntW6wfU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:53:33,433:DEBUG:acme.client:Storing nonce: jqVAJFJ0wYY8SudDTb2P_m7D82yenHxs02XwNr32BPlRntW6wfU 2024-07-05 16:53:33,433:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:53:33,440:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjB3WVk4U3VkRFRiMlBfbTdEODJ5ZW5IeHMwMlh3TnIzMkJQbFJudFc2d2ZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iScGB9_J_ANq0JmLKg0OtW3RiANIrrIj8rSxNgljSH2a4yNlA-jsNFUPVK8t9QfUSobTvXqviwVxpbKy1xNj6Dwewn-G_5x4azhmr6Y-0trJbZn60XX1Xe4Dxi81Nzp9MotEj32S2acQkpkGcF5rNgCR_IxgBlX7y3Sc2qDIWjSfSoVnfBq7D2rVpkeFHEVOKfPAW_m8xSr_N6UR4KIEN-i4niRVKikkEu2wczT88YMVNDyj3FhZ7Qn2iZnDNSMAt9itN0D7hYkUmgL7n-pD1xhkjg-ZNduqilMMU2e2K47ihf5t53Mv3rYW2o1BDRhXMR3j9elwJCqHEeHLhvZXFQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-05 16:53:33,614:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-05 16:53:33,615:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:53:33 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963292297 Replay-Nonce: qqMiT6Ck75DlKV1yXzkRsugjYZnTTKJCZTX_OzaL5gcpSXcv_0U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:20Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963292297" } 2024-07-05 16:53:33,615:DEBUG:acme.client:Storing nonce: qqMiT6Ck75DlKV1yXzkRsugjYZnTTKJCZTX_OzaL5gcpSXcv_0U 2024-07-05 16:53:33,615:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:53:33,621:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2s3NURsS1YxeVh6a1JzdWdqWVpuVFRLSkNaVFhfT3phTDVnY3BTWGN2XzBVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0MDc1OTcifQ", "signature": "NCR_3KBm53QB00OwujvXUz9iWrTDg84mgr0SPANnMZbxS2rI8hVXSNL4sksoNoebajPg_1q3xSNpNnK-mMQCT9PeH1-TtYoh211IvIlje6hvtBTP9W86TqseOx_cQXuyP8JCGNbHEHNV559Zzn7nJc0M01MDyr65FIQP6uqH-JmeYmVCZIX262Bj8mxJUq892kbpGEHY38CypfUJ1cOe0zYHixkuwoZoGjapBYratAh3jh2WJFIBxodXZ4IGL04a0HC-8yyyK1gpZJwge8QELgPkseiN-yLTWNJQUZmrPq4KgRbwH_wcAxxT7Omk9ogq7nAcMZwBjwmyMsmHlRSIAQ", "payload": "" } 2024-07-05 16:53:33,799:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123407597 HTTP/1.1" 200 811 2024-07-05 16:53:33,800:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:53:33 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkynBxMvSmwyjPRNmTaQ4XeVAPTiVXZpEcnZxFSGWpCZg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:20Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/PlHedw", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/IGmPMQ", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/vPSuUg", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" } ] } 2024-07-05 16:53:33,800:DEBUG:acme.client:Storing nonce: qqMiT6CkynBxMvSmwyjPRNmTaQ4XeVAPTiVXZpEcnZxFSGWpCZg 2024-07-05 16:53:33,801:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:53:33,801:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-05 16:53:33,802:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:53:33,802:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:53:33,803:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:53:33,804:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:53:33,805:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:53:33,805:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:53:33,807:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:53:33,859:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:53:34,047:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:53:34,047:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 16:53:34,048:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 16:53:34,054:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-05 16:53:34,054:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:53:34,055:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:53:34,062:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:53:34,062:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:53:34,063:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:53:34,068:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:53:34,069:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:53:34,072:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:53:34,557:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:53:34,558:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:53:34 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WnF5Y09RFPI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 16:53:34,559:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:53:42,131:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8204_key-certbot.pem 2024-07-05 16:53:48,331:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8202_csr-certbot.pem 2024-07-05 16:53:48,332:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:53:48,332:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:53:48,496:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:53:48,497:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:53:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0PASAf0eGMBqk--n5TFD7raNBztbBOdQyd7uHINNdFag X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:53:48,497:DEBUG:acme.client:Storing nonce: jqVAJFJ0PASAf0eGMBqk--n5TFD7raNBztbBOdQyd7uHINNdFag 2024-07-05 16:53:48,497:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:53:48,503:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBQQVNBZjBlR01CcWstLW41VEZEN3JhTkJ6dGJCT2RReWQ3dUhJTk5kRmFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Uo-FFEaGoQW_Hz3ZFuxTrGte9HZA29gNm40d2uKoKlgcht38G5YSIn_PfLAEnJUEWCNS6LXZ9SWEAT1Ykc83yHLPIX87NMOUNovSMA9hy6HojN03KmZcrQEkN6UfwldrA7Qdg7hTZuy25t7dsCFPkYf0OLHy-m_taf8JDtvpQ5m7a1r30OHcH4AIP8LboS2HxSjbbwUnm1CHw7HHnmG6CoY4CUfdEOxxHVeEhGyZXGiiP2nS1A3tFou1tQBn5A63KKEym13BCoWvPb6fYTY5yihvnr4eVoXzHicgh8sS8IlhVSIPsN5zV5gFL_4ZmIFPIfsjsxIO1NhKZ_s-gIzO8g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-05 16:53:48,677:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-05 16:53:48,677:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:53:48 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963320687 Replay-Nonce: qqMiT6CkycLGxpewmeda4N5V_awEU0pyKmA2KbAgh2-3_eF1pW0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:30Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963320687" } 2024-07-05 16:53:48,678:DEBUG:acme.client:Storing nonce: qqMiT6CkycLGxpewmeda4N5V_awEU0pyKmA2KbAgh2-3_eF1pW0 2024-07-05 16:53:48,678:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:53:48,685:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2t5Y0xHeHBld21lZGE0TjVWX2F3RVUwcHlLbUEyS2JBZ2gyLTNfZUYxcFcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0NTI5OTcifQ", "signature": "CFtT-3aLOXkSGAjBgz5q_dRv1fPIt7IC9FeYyKd4py673AvuU2JWvvITOHtThxmffZPT3jVh7LkpHdQsiP2GKcDX5_CR5Ki4cDwiadMAw7VJouy-qlSB6AsNIufurUEJM8vRjAL1I18hgsDpxSQD2RPCPREHVLhj5fRnZmaQoXXUlSdOzPnWBTkxDa85e2PJ1MDQYpO8GFXWrSRCoHuMR7eGvRcwaKh7IndLGXxTFHKVBr3_S8chQZycCNHCYWID63zO09rxRzkQOub56EbXq1Of2jsOcKdtk3NQbeW2pIcQX4tEv1V854P-0sxwxHNjqDEG9l8QG_3oN0OdORPK4Q", "payload": "" } 2024-07-05 16:53:48,852:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123452997 HTTP/1.1" 200 810 2024-07-05 16:53:48,853:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:53:48 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ck3pNSEheSd7B5OwI_fcpHO0SBHvALocdcHmmEb4DcqGI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:30Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/jVGASw", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/HCdluw", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/7JAHfA", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" } ] } 2024-07-05 16:53:48,853:DEBUG:acme.client:Storing nonce: qqMiT6Ck3pNSEheSd7B5OwI_fcpHO0SBHvALocdcHmmEb4DcqGI 2024-07-05 16:53:48,854:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:53:48,855:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-05 16:53:48,856:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:53:48,856:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:53:48,857:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:53:48,858:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:53:48,858:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:53:48,858:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:53:48,860:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:53:48,908:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:53:49,102:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:53:49,104:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-05 16:53:49,104:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-05 16:53:49,109:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-05 16:53:49,109:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:53:49,110:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:53:49,116:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:53:49,117:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:53:49,117:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:53:49,133:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:53:49,134:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:53:49,137:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:53:49,615:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:53:49,615:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:53:49 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CM3QfMBFhKI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 16:53:49,616:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:53:55,885:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8205_key-certbot.pem 2024-07-05 16:54:01,988:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8203_csr-certbot.pem 2024-07-05 16:54:01,989:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:54:01,989:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:54:02,150:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:54:02,151:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:54:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ03MT8HsVf3AOZBPR9KRDTGTVU4HyK9ObwxXjO4BYu9kI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:54:02,151:DEBUG:acme.client:Storing nonce: jqVAJFJ03MT8HsVf3AOZBPR9KRDTGTVU4HyK9ObwxXjO4BYu9kI 2024-07-05 16:54:02,151:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:54:02,157:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjAzTVQ4SHNWZjNBT1pCUFI5S1JEVEdUVlU0SHlLOU9id3hYak80Qll1OWtJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "die_vLzxjXfh8gq0gDp7MdhQRF7qMClNC87Y6i9iI-KH5UncawQdzzmlshQEJ21Nggl-8QVDNOz29CYRCzC50T-B6_hVatL1a6FP40rnhll83M4NNQ4vE6DfCvpxfQVVaG95NSgtYyEtdd9MSirmJRHtiggP19gjppd599M0-MNjmkiPDqFd8AuFkRL17zdcEfO3KDlzJU6MQqLEkvEO7eE1FOubg3TbN1YYuJT9ru9HEuBQfP_W0D3Flo5py7IfBbz4tlwtJy7qu2hYqgyEjR_CBTQBboZKwSipGSGq3vk_eidQJxHOV1DTwVvY4qe6brf15lGj6gv6HDwxkE-Mhg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-05 16:54:02,328:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-05 16:54:02,329:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:54:02 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963348157 Replay-Nonce: jqVAJFJ0ls-uu_u-KqhqizZ5EK8NEOWstho3qWBwcjCEIbeLcrM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:40Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963348157" } 2024-07-05 16:54:02,329:DEBUG:acme.client:Storing nonce: jqVAJFJ0ls-uu_u-KqhqizZ5EK8NEOWstho3qWBwcjCEIbeLcrM 2024-07-05 16:54:02,329:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:54:02,336:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBscy11dV91LUtxaHFpelo1RUs4TkVPV3N0aG8zcVdCd2NqQ0VJYmVMY3JNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0OTU1NzcifQ", "signature": "CKo9STdN5mkPVKs3k1l5u0GS08mo-uVgFEa4ngM-Oat11v5o5xUlf794ULEL5Bma4m043FMmIKFapO_2V0uYzByJWymsNY9Sg2BJsby3nrnjIep0oWdgrYvX7zXsKys6Nzktnq9AoU2tQTxybQsNLQ91wiKSQuDpxR2yxD84rZn2d2GFphm4dO0ZNsaxSM9Fc8nqaERPd3srNEEonCnDiEWriCxWdKy_yfBeZw6syUwZkShpD-ES7Rskd8m5cFsdgDN6kqAYi6cJKJgZI5NRI1ypJuiXQql9-7Wikynzk6CkTM39J3XV1UNIsGvCAZqzfgy63IvqunagWwAtGSK44A", "payload": "" } 2024-07-05 16:54:02,501:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123495577 HTTP/1.1" 200 809 2024-07-05 16:54:02,501:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:54:02 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkiG1y5Es5TAH93__yN_z4w8W31qC4lgqc4zDQfL5aFxk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:40Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/CYYT4Q", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/HlKjqg", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/iwR44A", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" } ] } 2024-07-05 16:54:02,502:DEBUG:acme.client:Storing nonce: qqMiT6CkiG1y5Es5TAH93__yN_z4w8W31qC4lgqc4zDQfL5aFxk 2024-07-05 16:54:02,502:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:54:02,503:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-05 16:54:02,503:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:54:02,504:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:54:02,505:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:54:02,505:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:54:02,506:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:54:02,506:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:54:02,508:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:54:02,561:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:54:02,754:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:54:02,756:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-05 16:54:02,757:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-05 16:54:02,763:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-05 16:54:02,764:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:54:02,764:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:54:02,771:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:54:02,771:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:54:02,771:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:54:02,787:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:54:02,788:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:54:02,792:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:54:03,225:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:54:03,226:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:54:03 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "opBVsO_qDy8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 16:54:03,227:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:54:10,210:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8206_key-certbot.pem 2024-07-05 16:54:16,111:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8204_csr-certbot.pem 2024-07-05 16:54:16,112:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:54:16,112:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:54:16,258:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:54:16,259:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:54:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9fQHl6lc3eK37blXg1-sNEIPHPlZRzgeJTUklMeHUM1k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:54:16,259:DEBUG:acme.client:Storing nonce: eF-2qMJ9fQHl6lc3eK37blXg1-sNEIPHPlZRzgeJTUklMeHUM1k 2024-07-05 16:54:16,259:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:54:16,267:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlmUUhsNmxjM2VLMzdibFhnMS1zTkVJUEhQbFpSemdlSlRVa2xNZUhVTTFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qkbfvionmIkOm7wp74ZmbQnF6CAlA3kNOESaCT9scRwNKEdxmlcLSHNTHUbfgu3Nj50dZbxhxmisZwZ3iLy3_pJ0ZGc2COlIiPcq4ERfRxIPIBimSmlLJ1C5q8FQ5spvo_vWoo-DxQpiandB-SAshYFzHrSR0v-TxkQlHsCBn32OYW6JdViLnPl38i9H6kFb7nCt9cSo6eSINVaj4kRNyslCW0PAAMMJLIufZ3G0YwoFp5BeHci-Xnkdre_fP7J9bbYC_f1SRaHZmSwr60oDju_lId6kmBmchEFi1uPBtz39k6w7r4ffZ2LEIPofBffgmEjSksNUNXaGyeLEYe2o1w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-05 16:54:16,450:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-05 16:54:16,450:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:54:16 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963374667 Replay-Nonce: B-hK_YLCOlfPK5jR6Wu5UIaoVBdRBQPwa1Rm5sphmLRsuLinyCQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:51Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963374667" } 2024-07-05 16:54:16,451:DEBUG:acme.client:Storing nonce: B-hK_YLCOlfPK5jR6Wu5UIaoVBdRBQPwa1Rm5sphmLRsuLinyCQ 2024-07-05 16:54:16,451:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:54:16,458:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENPbGZQSzVqUjZXdTVVSWFvVkJkUkJRUHdhMVJtNXNwaG1MUnN1TGlueUNRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1MzU4NjcifQ", "signature": "Lb1hGThywIUSPCoz42XphSUj_-qP7lWY-YYm-RXn-6V9L2-WkpFuRFEUI79kyWsNILqgo_Tga9srSi__2QbvPux7zN95yVzQI5LkxZpDQEQ2GJFuC8xc-sy7D7UFU-DzBl6cMaqv-yDyree1P12eF0wGClaiHrW4DCRfliEysnz_rfCwRFd7pVZbnkxGKB21ef7wCVsNXggxGOf531ZCHRK1DBcuUvrB1Cht_BGUSREibblKkMZublJZRp85L5aFWjLwGW1e64qzjUkNwOlgLB3livTLPiGyBL0PTBIokD4hg9YKJGpk_Zbu1lJbw-4t5kH1QB4Hu9lQbqT9n2O8nQ", "payload": "" } 2024-07-05 16:54:16,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123535867 HTTP/1.1" 200 805 2024-07-05 16:54:16,608:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:54:16 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9R5vg5doO_Dw9BxAzuI61WMEOudLeiQE2crIDiDyeu3s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:51Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/7949-Q", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/1xlmxg", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/Gfn7VQ", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" } ] } 2024-07-05 16:54:16,608:DEBUG:acme.client:Storing nonce: eF-2qMJ9R5vg5doO_Dw9BxAzuI61WMEOudLeiQE2crIDiDyeu3s 2024-07-05 16:54:16,609:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:54:16,610:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-05 16:54:16,610:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:54:16,611:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:54:16,612:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:54:16,612:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:54:16,612:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:54:16,612:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:54:16,614:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:54:16,677:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:54:16,884:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:54:16,886:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 16:54:16,887:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 16:54:16,891:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-05 16:54:16,891:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:54:16,892:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:54:16,897:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:54:16,897:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:54:16,897:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:54:16,903:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:54:16,904:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:54:16,906:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:54:17,341:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:54:17,341:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:54:17 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "IJ1AskNfzRg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 16:54:17,342:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:54:24,036:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8207_key-certbot.pem 2024-07-05 16:54:30,399:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8205_csr-certbot.pem 2024-07-05 16:54:30,400:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:54:30,400:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:54:30,546:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:54:30,547:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:54:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9pPuONWAA7EX3xG0rc7iILlTGqGMbVvPZOMpkrV8Ao7M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:54:30,547:DEBUG:acme.client:Storing nonce: eF-2qMJ9pPuONWAA7EX3xG0rc7iILlTGqGMbVvPZOMpkrV8Ao7M 2024-07-05 16:54:30,548:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:54:30,556:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlwUHVPTldBQTdFWDN4RzByYzdpSUxsVEdxR01iVnZQWk9NcGtyVjhBbzdNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "rFu_sIvsnvJ2I0bhdEqIRnlMcxfqvcwlQ11kKbKzDTt48Rb9TlrwG5jkXJvMwsblJlmRKrBV5EPFdI5dmLZDTt4Kuuk1SzYEcfRCVkEjfbp8UyDVyJruNz3PHoYwjH4Tp1zXt5ouQpuoqq4W6WzBYsGynVnRgAGQt29RfTvvD-d3-NZINRfV-ySHUgzv_ooe6tNITFCYA43Xs-SifVwd6V7X6D5srcyiVEAmStcaHlxnzb9Byq8mjFW3NvD5VlftacapwxgAicl7Itd0szsONu5tixTpo7L0uzTP-ufBYB2UgUh6VhGvCQsXiXoFeech4cVO2jIEb510BRPtnqw6Pg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-05 16:54:30,715:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-05 16:54:30,716:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:54:30 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963400877 Replay-Nonce: B-hK_YLC8vEwKxwa1Tfx8L9upsQrhfExtc80uH34L9mVtyZvSE4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:19:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963400877" } 2024-07-05 16:54:30,716:DEBUG:acme.client:Storing nonce: B-hK_YLC8vEwKxwa1Tfx8L9upsQrhfExtc80uH34L9mVtyZvSE4 2024-07-05 16:54:30,716:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:54:30,724:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEM4dkV3S3h3YTFUZng4TDl1cHNRcmhmRXh0YzgwdUgzNEw5bVZ0eVp2U0U0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1NzQzNDcifQ", "signature": "bJ87IfNoDyKRUP4nwn9Cu5Gtn81ZynkgIqsTg8BK2S_n66YqekdZXsa00gF9S39tFFqRkKOSBkfMc4_sivzTwyqZ1i0cVxYXdlfyPHVgjBKvqCQp-IDW6RdvPGOne1_2xOMng16nprw07qffRDd7utLsHHSUgWtQX29xDrJgGtqekjX4WNT2lSmL2U7oMpeBN9XlV-UkgJiRAQgWurnu7GU-veueP_WS_Mphbl_Vwd_ACQ3oXScO2PaszD02FFtTTcrASyR0pywhFq8giqleH_Q8DedwmIrLFOriO763-4gceRfK4tdW9EBwKVnkbLjT6XzYgS6dJEHna6yO-mmcuQ", "payload": "" } 2024-07-05 16:54:30,874:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123574347 HTTP/1.1" 200 805 2024-07-05 16:54:30,874:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:54:30 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9qbs_H66P4Xa6LXgdpLiQ-H20oR4OSlrcmiDJOezlm4U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:19:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/NeAJIw", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/4slvLA", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/_5WNoA", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" } ] } 2024-07-05 16:54:30,875:DEBUG:acme.client:Storing nonce: eF-2qMJ9qbs_H66P4Xa6LXgdpLiQ-H20oR4OSlrcmiDJOezlm4U 2024-07-05 16:54:30,875:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:54:30,875:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-05 16:54:30,875:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:54:30,875:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:54:30,876:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:54:30,876:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:54:30,877:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:54:30,877:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:54:30,879:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:54:30,934:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 16:54:31,144:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 16:54:31,145:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-05 16:54:31,146:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-05 16:54:31,152:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-05 16:54:31,152:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 16:54:31,153:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 16:54:31,161:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-05 16:54:31,162:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-05 16:54:31,162:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 16:54:31,179:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-05 16:54:31,180:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 16:54:31,182:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 16:54:31,664:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 16:54:31,665:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:54:31 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Pa8Q7wAfTZk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 16:54:31,666:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 16:54:38,622:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8208_key-certbot.pem 2024-07-05 16:54:44,461:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8206_csr-certbot.pem 2024-07-05 16:54:44,462:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 16:54:44,462:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 16:54:44,623:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 16:54:44,624:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:54:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CktGQztYOZRF3eDUjYI4iHAtZsg-JKJDYrN6NOpM4QB9w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 16:54:44,625:DEBUG:acme.client:Storing nonce: qqMiT6CktGQztYOZRF3eDUjYI4iHAtZsg-JKJDYrN6NOpM4QB9w 2024-07-05 16:54:44,625:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 16:54:44,631:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2t0R1F6dFlPWlJGM2VEVWpZSTRpSEF0WnNnLUpLSkRZck42Tk9wTTRRQjl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BDBV3duaKQR-rnqbUEmggK7ley5o-UU-yuDXDTHvcZaoackw-AnmcaEy5htwgAc3SgEWlmdyw1qbgmF4ixQmurjZze3ntUH6VEdyMJC9vbpH8ALpD9ycgAWq37bcQWsqP37lrGeooKjHGdGr5F2a9YA4S8mDwkcPgakDEc2R5nFsGs1IyvOMyM5zJ0mpNORnfpDaJepxxohAxbBKp0L-Jk8HbrR46Xeq8vzLJWLTWh5RrqbXjK_3EiJ1CITm26TrsY0FA4romank2hk3_NYnI68SgQwc1VRgrodGz5OsLouYmVITcwJ78xL3WjdLnNqJsb-yuqaD7vKUPplsUdegfA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-05 16:54:44,806:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-05 16:54:44,807:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 14:54:44 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963440917 Replay-Nonce: qqMiT6CkJWkSlvpbrS0FCLntc5FNd_8qirQT4zLfP-GNKSmQzMo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:19:11Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963440917" } 2024-07-05 16:54:44,807:DEBUG:acme.client:Storing nonce: qqMiT6CkJWkSlvpbrS0FCLntc5FNd_8qirQT4zLfP-GNKSmQzMo 2024-07-05 16:54:44,807:DEBUG:acme.client:JWS payload: b'' 2024-07-05 16:54:44,815:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tKV2tTbHZwYnJTMEZDTG50YzVGTmRfOHFpclFUNHpMZlAtR05LU21Rek1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM2MzMxMzcifQ", "signature": "Pc9O4lPilrY76gOk-5r_SzvhuEp8HAEwyn7FFTgqfYMy6MLg6UmU7ZbFaeGP3mr-PQJ_TJlvrjhDiTrJs8z4-JmUVrnYISFjCARE_70Pe0FjBIhCyVAa_nYwj0cTZWKltxyDGuAjkG-sit_cUD1NBBTnk2qs-17F-LyfiNPr9CiIWXSfN8dHwAGKlPoJAGtyUsqxvu6epDAsfKq9Loa9EcZTw0VXhB_ikhR6dwHkR8ti_7IWHomSnQPi3JM23Gbv1JtB5coLKtfuTe-Q59vIcCAk61DZmhO-toLtg7fP8ERTj67vbKHVH_M-81MOVubbEZ1qbQRBXjA59CUppuCgUg", "payload": "" } 2024-07-05 16:54:44,979:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123633137 HTTP/1.1" 200 805 2024-07-05 16:54:44,980:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 14:54:44 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ck-nbBlTdRMa9y7nGSWa10JXg9BrPHbWm7T-4T2csI6rY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:19:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/cKgBUw", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/fI1u_A", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/N6igCw", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" } ] } 2024-07-05 16:54:44,980:DEBUG:acme.client:Storing nonce: qqMiT6Ck-nbBlTdRMa9y7nGSWa10JXg9BrPHbWm7T-4T2csI6rY 2024-07-05 16:54:44,981:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 16:54:44,982:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-05 16:54:44,982:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 16:54:44,983:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 16:54:44,984:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:54:44,984:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 16:54:44,984:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 16:54:44,985:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 16:54:44,986:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 16:54:44,986:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-05 16:54:44,987:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-05 16:54:44,999:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-07-05 16:54:45,001:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)